3 Gündür Mavi Ekran Sorunu minidump

H4C1..

Decapat
Katılım
4 Mart 2019
Mesajlar
27
Merhaba iyi günler. 3 gündür farklı hatalar ile mavi ekran alıyorum. DDU ile ekran kartı driverini silip tekrar güncel bir şekilde kurdum. BIOS güncelledim. OCCT testine soktum. Memtest86 testinde 4 saat tarama yaptı ama temiz çıktı. Sorunlu parçanın hangisi olduğunu bulamıyorum, bir bulsam garantiye vereceğim. Yardımcı olursanız çok sevinirim. Elimden başka bir şey gelmiyor artık.

Minidump dosyası: İndir minidump rar
 

Dosya Ekleri

  • 9451887f-6de8-46ce-8e29-26c72b0419d4.jpg
    9451887f-6de8-46ce-8e29-26c72b0419d4.jpg
    193,6 KB · Görüntüleme: 71
Hataların hepsi RAM ile alakalı Memtest86 testini geçmesi sorunsuz oldukları anlamına gelmiyor o yüzden bir tanesini çıkarıp öyle test edin sistemi.
Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80017863aa0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff800`17863aa0 4883ec28        sub     rsp,28h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff800176620ab to fffff800175f3ea0

STACK_TEXT:
ffffa388`f62cab68 fffff800`176620ab : 00000000`00000001 fffff800`17863aa0 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa388`f62cab70 fffff800`17466dd5 : ffffd784`583e7140 00000000`00000080 ffffd784`58283040 00000000`00490055 : nt!ExpWorkerThread+0x1a029b
ffffa388`f62cac10 fffff800`175fb4f8 : ffffc680`a1d40180 ffffd784`583e7140 fffff800`17466d80 0020006b`0061006d : nt!PspSystemThreadStartup+0x55
ffffa388`f62cac60 00000000`00000000 : ffffa388`f62cb000 ffffa388`f62c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .bugcheck ; kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800175963ae-fffff800175963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:20 7e fc f8 ]
4 errors : !nt (fffff800175963ae-fffff800175963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffaa9965ac4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd809c5a8b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
+3318fa474849359
00007ffa`a9965ac4 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80152005e69 to fffff80151ff3ea0

STACK_TEXT:
fffffd80`9c5a89b8 fffff801`52005e69 : 00000000`00000001 00007ffa`a9965ac4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffffd80`9c5a89c0 fffff801`52005d33 : ffffb508`d2c80080 ffffb508`d2c80080 00000140`5d50f778 00000000`00000020 : nt!KiBugCheckDispatch+0x69
fffffd80`9c5a8b00 00007ffa`a9965ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000003b`f467f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a9965ac4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffb4a910e047a2-ffffb4a910e047a3  2 bytes - win32kbase!DxgkEngVisRgnUniq+12
    [ 48 ff:4c 8b ]
    ffffb4a910e047a9-ffffb4a910e047ac  4 bytes - win32kbase!DxgkEngVisRgnUniq+19 (+0x07)
    [ 0f 1f 44 00:e8 72 dc 2d ]
    ffffb4a910e047ec-ffffb4a910e047ed  2 bytes - win32kbase!DxgkEngVisRgnUniq+5c (+0x43)
    [ 48 ff:4c 8b ]
    ffffb4a910e047f3-ffffb4a910e047f6  4 bytes - win32kbase!DxgkEngVisRgnUniq+63 (+0x07)
    [ 0f 1f 44 00:e8 28 dc 2d ]
    ffffb4a910e047f8-ffffb4a910e047f9  2 bytes - win32kbase!DxgkEngVisRgnUniq+68 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e047ff-ffffb4a910e04802  4 bytes - win32kbase!DxgkEngVisRgnUniq+6f (+0x07)
    [ 0f 1f 44 00:e8 1c dc 2d ]
    ffffb4a910e19c77-ffffb4a910e19c7c  6 bytes - win32kbase!GreDeleteObject+d7 (+0x15478)
    [ ff 15 3b 73 26 00:e8 24 86 2c 00 90 ]
    ffffb4a910e19c92-ffffb4a910e19c97  6 bytes - win32kbase!GreDeleteObject+f2 (+0x1b)
    [ ff 15 20 73 26 00:e8 09 86 2c 00 90 ]
    ffffb4a910e37348-ffffb4a910e3734d  6 bytes - win32kbase!DxgkEngAssertGdiOutput+98 (+0x1d6b6)
    [ ff 15 6a 9c 24 00:e8 53 af 2a 00 90 ]
    ffffb4a910e378b3-ffffb4a910e378b4  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+33 (+0x56b)
    [ 48 ff:4c 8b ]
    ffffb4a910e378ba-ffffb4a910e378bd  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+3a (+0x07)
    [ 0f 1f 44 00:e8 61 ab 2a ]
    ffffb4a910e378c9-ffffb4a910e378ca  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e378d0-ffffb4a910e378d3  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+50 (+0x07)
    [ 0f 1f 44 00:e8 4b ab 2a ]
    ffffb4a910e37900-ffffb4a910e37901  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+80 (+0x30)
    [ 48 ff:4c 8b ]
    ffffb4a910e37907-ffffb4a910e3790a  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+87 (+0x07)
    [ 0f 1f 44 00:e8 14 ab 2a ]
    ffffb4a910e37914-ffffb4a910e37915  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+94 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffb4a910e3791b-ffffb4a910e3791e  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+9b (+0x07)
    [ 0f 1f 44 00:e8 00 ab 2a ]
    ffffb4a910e3792e-ffffb4a910e3792f  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+ae (+0x13)
    [ 48 ff:4c 8b ]
    ffffb4a910e37935-ffffb4a910e37938  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+b5 (+0x07)
    [ 0f 1f 44 00:e8 e6 aa 2a ]
    ffffb4a910e3795d-ffffb4a910e3795e  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+dd (+0x28)
    [ 48 ff:4c 8b ]
    ffffb4a910e37964-ffffb4a910e37967  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 b7 aa 2a ]
    ffffb4a910e37973-ffffb4a910e37974  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+f3 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e3797a-ffffb4a910e3797d  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+fa (+0x07)
    [ 0f 1f 44 00:e8 a1 aa 2a ]
    ffffb4a910e37bcf-ffffb4a910e37bd0  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+6f (+0x255)
    [ 48 ff:4c 8b ]
    ffffb4a910e37bd6-ffffb4a910e37bd9  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+76 (+0x07)
    [ 0f 1f 44 00:e8 45 a8 2a ]
    ffffb4a910e37bdb-ffffb4a910e37bdc  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+7b (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37be2-ffffb4a910e37be5  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+82 (+0x07)
    [ 0f 1f 44 00:e8 39 a8 2a ]
    ffffb4a910e37c06-ffffb4a910e37c07  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+a6 (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c0d-ffffb4a910e37c10  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+ad (+0x07)
    [ 0f 1f 44 00:e8 0e a8 2a ]
    ffffb4a910e37c12-ffffb4a910e37c13  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b2 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c19-ffffb4a910e37c1c  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b9 (+0x07)
    [ 0f 1f 44 00:e8 02 a8 2a ]
    ffffb4a910e37c3d-ffffb4a910e37c3e  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+dd (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c44-ffffb4a910e37c47  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 d7 a7 2a ]
    ffffb4a910e37c49-ffffb4a910e37c4a  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e9 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c50-ffffb4a910e37c53  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+f0 (+0x07)
    [ 0f 1f 44 00:e8 cb a7 2a ]
    ffffb4a910e54ada-ffffb4a910e54adb  2 bytes - win32kbase!GreCombineRgn+8a (+0x1ce8a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54ae1-ffffb4a910e54ae4  4 bytes - win32kbase!GreCombineRgn+91 (+0x07)
    [ 0f 1f 44 00:e8 3a d9 28 ]
    ffffb4a910e54aeb-ffffb4a910e54aec  2 bytes - win32kbase!GreCombineRgn+9b (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54af2-ffffb4a910e54af5  4 bytes - win32kbase!GreCombineRgn+a2 (+0x07)
    [ 0f 1f 44 00:e8 29 d9 28 ]
    ffffb4a910e54b0c-ffffb4a910e54b0d  2 bytes - win32kbase!GreCombineRgn+bc (+0x1a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b13-ffffb4a910e54b16  4 bytes - win32kbase!GreCombineRgn+c3 (+0x07)
    [ 0f 1f 44 00:e8 08 d9 28 ]
    ffffb4a910e54b1d-ffffb4a910e54b1e  2 bytes - win32kbase!GreCombineRgn+cd (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b24-ffffb4a910e54b27  4 bytes - win32kbase!GreCombineRgn+d4 (+0x07)
    [ 0f 1f 44 00:e8 f7 d8 28 ]
    ffffb4a910e54b46-ffffb4a910e54b47  2 bytes - win32kbase!GreCombineRgn+f6 (+0x22)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b4d-ffffb4a910e54b4f  3 bytes - win32kbase!GreCombineRgn+fd (+0x07)
    [ 0f 1f 44:e8 ce d8 ]
    ffffb4a910e66a29-ffffb4a910e66a2a  2 bytes - win32kbase!UserEnterUserCritSecShared+29 (+0x11edc)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a30-ffffb4a910e66a33  4 bytes - win32kbase!UserEnterUserCritSecShared+30 (+0x07)
    [ 0f 1f 44 00:e8 eb b9 27 ]
    ffffb4a910e66a3f-ffffb4a910e66a40  2 bytes - win32kbase!UserEnterUserCritSecShared+3f (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a46-ffffb4a910e66a49  4 bytes - win32kbase!UserEnterUserCritSecShared+46 (+0x07)
    [ 0f 1f 44 00:e8 d5 b9 27 ]
    ffffb4a910e66a71-ffffb4a910e66a72  2 bytes - win32kbase!UserEnterUserCritSecShared+71 (+0x2b)
    [ 48 ff:4c 8b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
289 errors : !win32kbase (ffffb4a910e047a2-ffffb4a9110044a9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffde81ecdf9a90, Address of resource
Arg2: ffffde81f2c8e080, Address of thread
Arg3: ffffde81f1955710, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xE3

PROCESS_NAME:  SystemSettings

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8055b26bc89 to fffff8055b1f3ea0

STACK_TEXT:
ffffb18f`a78a0918 fffff805`5b26bc89 : 00000000`000000e3 ffffde81`ecdf9a90 ffffde81`f2c8e080 ffffde81`f1955710 : nt!KeBugCheckEx
ffffb18f`a78a0920 fffff805`5b0e1ef9 : ffffde81`ecdf9a90 ffffb18f`a78a0ec0 00000000`00000000 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x18b909
ffffb18f`a78a09e0 ffffddae`9a664cf4 : 00000000`00000000 00000000`00000000 ffffddd7`06121010 fffff805`5b0cbad2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffffb18f`a78a0a40 ffffddae`9a74892e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001042 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffffb18f`a78a0ab0 ffffddae`9aa6dbd1 : ffffde81`f2c8e080 ffffb18f`00000000 ffffddd7`06121010 00000000`00000000 : win32kbase!NtUserSystemParametersInfo+0x119e
ffffb18f`a78a0e00 fffff805`5b2058b8 : ffffde81`f2c8e080 ffffde81`f0abbbe0 ffffb18f`00000000 ffffb18f`a543eb80 : win32k!NtUserSystemParametersInfo+0x15
ffffb18f`a78a0e40 00007ff8`b3901884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`7017e158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b3901884


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffddae9a645679-ffffddae9a64567e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 39 b9 23 00:e8 22 cc 29 00 90 ]
    ffffddae9a645692-ffffddae9a645697  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 20 b9 23 00:e8 09 cc 29 00 90 ]
    ffffddae9a6456db-ffffddae9a6456dc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffffddae9a6456e2-ffffddae9a6456e5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 39 cd 29 ]
    ffffddae9a645723-ffffddae9a645728  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
    ffffddae9a64574f-ffffddae9a645754  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
    ffffddae9a664d14-ffffddae9a664d15  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1f5c5)
    [ 48 ff:4c 8b ]
    ffffddae9a664d1b-ffffddae9a664d1e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 00 d7 27 ]
    ffffddae9a6a3f31 - win32kbase!PopAndFreeAlwaysW32ThreadLock+15 (+0x3f216)
    [ 00:90 ]
    ffffddae9a6a3f59-ffffddae9a6a3f5a  2 bytes - win32kbase!UpdatesLockedForDwm+19 (+0x28)
    [ 48 ff:4c 8b ]
    ffffddae9a6a3f60-ffffddae9a6a3f63  4 bytes - win32kbase!UpdatesLockedForDwm+20 (+0x07)
    [ 0f 1f 44 00:e8 bb e4 23 ]
    ffffddae9a6a70d3-ffffddae9a6a70d8  6 bytes - win32kbase!CInputSink::MarkInvalid+13 (+0x3173)
    [ ff 15 df 9e 1d 00:e8 c8 b1 23 00 90 ]
    ffffddae9a6a713a-ffffddae9a6a713b  2 bytes - win32kbase!CompositionInputObject::LockForWrite+2a (+0x67)
    [ 48 ff:4c 8b ]
    ffffddae9a6a7141-ffffddae9a6a7144  4 bytes - win32kbase!CompositionInputObject::LockForWrite+31 (+0x07)
    [ 0f 1f 44 00:e8 da b2 23 ]
    ffffddae9a6a7195-ffffddae9a6a719a  6 bytes - win32kbase!CPushLock::AcquireLockExclusive+15 (+0x54)
    [ ff 15 1d 9e 1d 00:e8 06 b1 23 00 90 ]
    ffffddae9a6a719f-ffffddae9a6a71a0  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+1f (+0x0a)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71a6-ffffddae9a6a71a9  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+26 (+0x07)
    [ 0f 1f 44 00:e8 75 b2 23 ]
    ffffddae9a6a71b1-ffffddae9a6a71b2  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+31 (+0x0b)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71b8-ffffddae9a6a71bb  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+38 (+0x07)
    [ 0f 1f 44 00:e8 63 b2 23 ]
    ffffddae9a6abc5a-ffffddae9a6abc5b  2 bytes - win32kbase!MarkImmersiveProcess+5a (+0x4aa2)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc61-ffffddae9a6abc64  4 bytes - win32kbase!MarkImmersiveProcess+61 (+0x07)
    [ 0f 1f 44 00:e8 ba 67 23 ]
    ffffddae9a6abc6e-ffffddae9a6abc6f  2 bytes - win32kbase!MarkImmersiveProcess+6e (+0x0d)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc75-ffffddae9a6abc78  4 bytes - win32kbase!MarkImmersiveProcess+75 (+0x07)
    [ 0f 1f 44 00:e8 a6 67 23 ]
    ffffddae9a6abcc6-ffffddae9a6abcc7  2 bytes - win32kbase!MarkImmersiveProcess+c6 (+0x51)
    [ 48 ff:4c 8b ]
    ffffddae9a6abccd-ffffddae9a6abcd0  4 bytes - win32kbase!MarkImmersiveProcess+cd (+0x07)
    [ 0f 1f 44 00:e8 4e 67 23 ]
    ffffddae9a6abcd6-ffffddae9a6abcd7  2 bytes - win32kbase!MarkImmersiveProcess+d6 (+0x09)
    [ 48 ff:4c 8b ]
    ffffddae9a6abcdd-ffffddae9a6abce0  4 bytes - win32kbase!MarkImmersiveProcess+dd (+0x07)
    [ 0f 1f 44 00:e8 3e 67 23 ]
    ffffddae9a6ac0ce-ffffddae9a6ac0d3  6 bytes - win32kbase!CInputSink::IsLockValid+e (+0x3f1)
    [ ff 15 e4 4e 1d 00:e8 cd 61 23 00 90 ]
    ffffddae9a6ac10c-ffffddae9a6ac111  6 bytes - win32kbase!IsGetLayeredOrRedirectedParentSupported+10 (+0x3e)
    [ ff 15 a6 4e 1d 00:e8 8f 61 23 00 90 ]
    ffffddae9a6ac163-ffffddae9a6ac164  2 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+33 (+0x57)
    [ 48 ff:4c 8b ]
    ffffddae9a6ac16a-ffffddae9a6ac16d  4 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+3a (+0x07)
    [ 0f 1f 44 00:e8 b1 62 23 ]
    ffffddae9a6b809e-ffffddae9a6b80a3  6 bytes - win32kbase!CInputSink::Delete+2e (+0xbf34)
    [ ff 15 14 8f 1c 00:e8 fd a1 22 00 90 ]
    ffffddae9a6b80b2-ffffddae9a6b80b7  6 bytes - win32kbase!CInputSink::Delete+42 (+0x14)
    [ ff 15 00 8f 1c 00:e8 e9 a1 22 00 90 ]
    ffffddae9a6c0a2a-ffffddae9a6c0a2b  2 bytes - win32kbase!CInpLockGuard::UnLock+1a (+0x8978)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a31-ffffddae9a6c0a34  4 bytes - win32kbase!CInpLockGuard::UnLock+21 (+0x07)
    [ 0f 1f 44 00:e8 ea 19 22 ]
    ffffddae9a6c0a60-ffffddae9a6c0a61  2 bytes - win32kbase!CInpLockGuard::isOwned+10 (+0x2f)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a67-ffffddae9a6c0a6a  4 bytes - win32kbase!CInpLockGuard::isOwned+17 (+0x07)
    [ 0f 1f 44 00:e8 b4 19 22 ]
    ffffddae9a6c0a75-ffffddae9a6c0a76  2 bytes - win32kbase!CInpLockGuard::isOwned+25 (+0x0e)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a7c-ffffddae9a6c0a7f  4 bytes - win32kbase!CInpLockGuard::isOwned+2c (+0x07)
    [ 0f 1f 44 00:e8 9f 19 22 ]
    ffffddae9a6c0ac8-ffffddae9a6c0ac9  2 bytes - win32kbase!SetGlobalCursorLevel+28 (+0x4c)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0acf-ffffddae9a6c0ad2  4 bytes - win32kbase!SetGlobalCursorLevel+2f (+0x07)
    [ 0f 1f 44 00:e8 4c 19 22 ]
    ffffddae9a7489df-ffffddae9a7489e0  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+2f (+0x87f10)
    [ 48 ff:4c 8b ]
    ffffddae9a7489e6-ffffddae9a7489e9  4 bytes - win32kbase!NtUserUnloadKeyboardLayout+36 (+0x07)
    [ 0f 1f 44 00:e8 35 9a 19 ]
    ffffddae9a7489f5-ffffddae9a7489f6  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+45 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffddae9a7489fc - win32kbase!NtUserUnloadKeyboardLayout+4c (+0x07)
    [ 0f:e8 ]
    ffffddae9a7489fe-ffffddae9a7489ff  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+4e (+0x02)
    [ 44 00:9a 19 ]
    ffffddae9a748a29-ffffddae9a748a2a  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+79 (+0x2b)
    [ 48 ff:4c 8b ]
164 errors : !win32kbase (ffffddae9a645679-ffffddae9a748a2a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa85aac444
Arg3: 000000000000001d
Arg4: ffffaa89e2699b00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  EpicGamesLaunc

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8006a072c08 to fffff80069ff3ea0

STACK_TEXT:
ffffaa89`e2699958 fffff800`6a072c08 : 00000000`0000001a 00000000`00061941 00007ffa`85aac444 00000000`0000001d : nt!KeBugCheckEx
ffffaa89`e2699960 fffff800`6a00205e : ffffad88`53bbe080 00000000`00000000 ffffffff`ffff63c0 00000000`00000000 : nt!MmAccessFault+0x184488
ffffaa89`e2699b00 00007ffa`85aac444 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`f2e2fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`85aac444


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80069f963ae-fffff80069f963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:e0 fb f7 ef ]
4 errors : !nt (fffff80069f963ae-fffff80069f963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Hocam meraktan soruyorum kaç GB raminiz vardı?
Corsair Veangence pro 8*2GB 3200mhz.
Hataların hepsi RAM ile alakalı Memtest86 testini geçmesi sorunsuz oldukları anlamına gelmiyor o yüzden bir tanesini çıkarıp öyle test edin sistemi.
Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80017863aa0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff800`17863aa0 4883ec28        sub     rsp,28h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff800176620ab to fffff800175f3ea0

STACK_TEXT:
ffffa388`f62cab68 fffff800`176620ab : 00000000`00000001 fffff800`17863aa0 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa388`f62cab70 fffff800`17466dd5 : ffffd784`583e7140 00000000`00000080 ffffd784`58283040 00000000`00490055 : nt!ExpWorkerThread+0x1a029b
ffffa388`f62cac10 fffff800`175fb4f8 : ffffc680`a1d40180 ffffd784`583e7140 fffff800`17466d80 0020006b`0061006d : nt!PspSystemThreadStartup+0x55
ffffa388`f62cac60 00000000`00000000 : ffffa388`f62cb000 ffffa388`f62c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .bugcheck ; kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800175963ae-fffff800175963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:20 7e fc f8 ]
4 errors : !nt (fffff800175963ae-fffff800175963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffaa9965ac4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd809c5a8b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
+3318fa474849359
00007ffa`a9965ac4 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80152005e69 to fffff80151ff3ea0

STACK_TEXT:
fffffd80`9c5a89b8 fffff801`52005e69 : 00000000`00000001 00007ffa`a9965ac4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffffd80`9c5a89c0 fffff801`52005d33 : ffffb508`d2c80080 ffffb508`d2c80080 00000140`5d50f778 00000000`00000020 : nt!KiBugCheckDispatch+0x69
fffffd80`9c5a8b00 00007ffa`a9965ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000003b`f467f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a9965ac4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffb4a910e047a2-ffffb4a910e047a3  2 bytes - win32kbase!DxgkEngVisRgnUniq+12
    [ 48 ff:4c 8b ]
    ffffb4a910e047a9-ffffb4a910e047ac  4 bytes - win32kbase!DxgkEngVisRgnUniq+19 (+0x07)
    [ 0f 1f 44 00:e8 72 dc 2d ]
    ffffb4a910e047ec-ffffb4a910e047ed  2 bytes - win32kbase!DxgkEngVisRgnUniq+5c (+0x43)
    [ 48 ff:4c 8b ]
    ffffb4a910e047f3-ffffb4a910e047f6  4 bytes - win32kbase!DxgkEngVisRgnUniq+63 (+0x07)
    [ 0f 1f 44 00:e8 28 dc 2d ]
    ffffb4a910e047f8-ffffb4a910e047f9  2 bytes - win32kbase!DxgkEngVisRgnUniq+68 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e047ff-ffffb4a910e04802  4 bytes - win32kbase!DxgkEngVisRgnUniq+6f (+0x07)
    [ 0f 1f 44 00:e8 1c dc 2d ]
    ffffb4a910e19c77-ffffb4a910e19c7c  6 bytes - win32kbase!GreDeleteObject+d7 (+0x15478)
    [ ff 15 3b 73 26 00:e8 24 86 2c 00 90 ]
    ffffb4a910e19c92-ffffb4a910e19c97  6 bytes - win32kbase!GreDeleteObject+f2 (+0x1b)
    [ ff 15 20 73 26 00:e8 09 86 2c 00 90 ]
    ffffb4a910e37348-ffffb4a910e3734d  6 bytes - win32kbase!DxgkEngAssertGdiOutput+98 (+0x1d6b6)
    [ ff 15 6a 9c 24 00:e8 53 af 2a 00 90 ]
    ffffb4a910e378b3-ffffb4a910e378b4  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+33 (+0x56b)
    [ 48 ff:4c 8b ]
    ffffb4a910e378ba-ffffb4a910e378bd  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+3a (+0x07)
    [ 0f 1f 44 00:e8 61 ab 2a ]
    ffffb4a910e378c9-ffffb4a910e378ca  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e378d0-ffffb4a910e378d3  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+50 (+0x07)
    [ 0f 1f 44 00:e8 4b ab 2a ]
    ffffb4a910e37900-ffffb4a910e37901  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+80 (+0x30)
    [ 48 ff:4c 8b ]
    ffffb4a910e37907-ffffb4a910e3790a  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+87 (+0x07)
    [ 0f 1f 44 00:e8 14 ab 2a ]
    ffffb4a910e37914-ffffb4a910e37915  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+94 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffb4a910e3791b-ffffb4a910e3791e  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+9b (+0x07)
    [ 0f 1f 44 00:e8 00 ab 2a ]
    ffffb4a910e3792e-ffffb4a910e3792f  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+ae (+0x13)
    [ 48 ff:4c 8b ]
    ffffb4a910e37935-ffffb4a910e37938  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+b5 (+0x07)
    [ 0f 1f 44 00:e8 e6 aa 2a ]
    ffffb4a910e3795d-ffffb4a910e3795e  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+dd (+0x28)
    [ 48 ff:4c 8b ]
    ffffb4a910e37964-ffffb4a910e37967  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 b7 aa 2a ]
    ffffb4a910e37973-ffffb4a910e37974  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+f3 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e3797a-ffffb4a910e3797d  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+fa (+0x07)
    [ 0f 1f 44 00:e8 a1 aa 2a ]
    ffffb4a910e37bcf-ffffb4a910e37bd0  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+6f (+0x255)
    [ 48 ff:4c 8b ]
    ffffb4a910e37bd6-ffffb4a910e37bd9  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+76 (+0x07)
    [ 0f 1f 44 00:e8 45 a8 2a ]
    ffffb4a910e37bdb-ffffb4a910e37bdc  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+7b (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37be2-ffffb4a910e37be5  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+82 (+0x07)
    [ 0f 1f 44 00:e8 39 a8 2a ]
    ffffb4a910e37c06-ffffb4a910e37c07  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+a6 (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c0d-ffffb4a910e37c10  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+ad (+0x07)
    [ 0f 1f 44 00:e8 0e a8 2a ]
    ffffb4a910e37c12-ffffb4a910e37c13  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b2 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c19-ffffb4a910e37c1c  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b9 (+0x07)
    [ 0f 1f 44 00:e8 02 a8 2a ]
    ffffb4a910e37c3d-ffffb4a910e37c3e  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+dd (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c44-ffffb4a910e37c47  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 d7 a7 2a ]
    ffffb4a910e37c49-ffffb4a910e37c4a  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e9 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c50-ffffb4a910e37c53  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+f0 (+0x07)
    [ 0f 1f 44 00:e8 cb a7 2a ]
    ffffb4a910e54ada-ffffb4a910e54adb  2 bytes - win32kbase!GreCombineRgn+8a (+0x1ce8a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54ae1-ffffb4a910e54ae4  4 bytes - win32kbase!GreCombineRgn+91 (+0x07)
    [ 0f 1f 44 00:e8 3a d9 28 ]
    ffffb4a910e54aeb-ffffb4a910e54aec  2 bytes - win32kbase!GreCombineRgn+9b (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54af2-ffffb4a910e54af5  4 bytes - win32kbase!GreCombineRgn+a2 (+0x07)
    [ 0f 1f 44 00:e8 29 d9 28 ]
    ffffb4a910e54b0c-ffffb4a910e54b0d  2 bytes - win32kbase!GreCombineRgn+bc (+0x1a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b13-ffffb4a910e54b16  4 bytes - win32kbase!GreCombineRgn+c3 (+0x07)
    [ 0f 1f 44 00:e8 08 d9 28 ]
    ffffb4a910e54b1d-ffffb4a910e54b1e  2 bytes - win32kbase!GreCombineRgn+cd (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b24-ffffb4a910e54b27  4 bytes - win32kbase!GreCombineRgn+d4 (+0x07)
    [ 0f 1f 44 00:e8 f7 d8 28 ]
    ffffb4a910e54b46-ffffb4a910e54b47  2 bytes - win32kbase!GreCombineRgn+f6 (+0x22)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b4d-ffffb4a910e54b4f  3 bytes - win32kbase!GreCombineRgn+fd (+0x07)
    [ 0f 1f 44:e8 ce d8 ]
    ffffb4a910e66a29-ffffb4a910e66a2a  2 bytes - win32kbase!UserEnterUserCritSecShared+29 (+0x11edc)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a30-ffffb4a910e66a33  4 bytes - win32kbase!UserEnterUserCritSecShared+30 (+0x07)
    [ 0f 1f 44 00:e8 eb b9 27 ]
    ffffb4a910e66a3f-ffffb4a910e66a40  2 bytes - win32kbase!UserEnterUserCritSecShared+3f (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a46-ffffb4a910e66a49  4 bytes - win32kbase!UserEnterUserCritSecShared+46 (+0x07)
    [ 0f 1f 44 00:e8 d5 b9 27 ]
    ffffb4a910e66a71-ffffb4a910e66a72  2 bytes - win32kbase!UserEnterUserCritSecShared+71 (+0x2b)
    [ 48 ff:4c 8b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
289 errors : !win32kbase (ffffb4a910e047a2-ffffb4a9110044a9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffde81ecdf9a90, Address of resource
Arg2: ffffde81f2c8e080, Address of thread
Arg3: ffffde81f1955710, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xE3

PROCESS_NAME:  SystemSettings

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8055b26bc89 to fffff8055b1f3ea0

STACK_TEXT:
ffffb18f`a78a0918 fffff805`5b26bc89 : 00000000`000000e3 ffffde81`ecdf9a90 ffffde81`f2c8e080 ffffde81`f1955710 : nt!KeBugCheckEx
ffffb18f`a78a0920 fffff805`5b0e1ef9 : ffffde81`ecdf9a90 ffffb18f`a78a0ec0 00000000`00000000 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x18b909
ffffb18f`a78a09e0 ffffddae`9a664cf4 : 00000000`00000000 00000000`00000000 ffffddd7`06121010 fffff805`5b0cbad2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffffb18f`a78a0a40 ffffddae`9a74892e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001042 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffffb18f`a78a0ab0 ffffddae`9aa6dbd1 : ffffde81`f2c8e080 ffffb18f`00000000 ffffddd7`06121010 00000000`00000000 : win32kbase!NtUserSystemParametersInfo+0x119e
ffffb18f`a78a0e00 fffff805`5b2058b8 : ffffde81`f2c8e080 ffffde81`f0abbbe0 ffffb18f`00000000 ffffb18f`a543eb80 : win32k!NtUserSystemParametersInfo+0x15
ffffb18f`a78a0e40 00007ff8`b3901884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`7017e158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b3901884


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffddae9a645679-ffffddae9a64567e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 39 b9 23 00:e8 22 cc 29 00 90 ]
    ffffddae9a645692-ffffddae9a645697  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 20 b9 23 00:e8 09 cc 29 00 90 ]
    ffffddae9a6456db-ffffddae9a6456dc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffffddae9a6456e2-ffffddae9a6456e5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 39 cd 29 ]
    ffffddae9a645723-ffffddae9a645728  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
    ffffddae9a64574f-ffffddae9a645754  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
    ffffddae9a664d14-ffffddae9a664d15  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1f5c5)
    [ 48 ff:4c 8b ]
    ffffddae9a664d1b-ffffddae9a664d1e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 00 d7 27 ]
    ffffddae9a6a3f31 - win32kbase!PopAndFreeAlwaysW32ThreadLock+15 (+0x3f216)
    [ 00:90 ]
    ffffddae9a6a3f59-ffffddae9a6a3f5a  2 bytes - win32kbase!UpdatesLockedForDwm+19 (+0x28)
    [ 48 ff:4c 8b ]
    ffffddae9a6a3f60-ffffddae9a6a3f63  4 bytes - win32kbase!UpdatesLockedForDwm+20 (+0x07)
    [ 0f 1f 44 00:e8 bb e4 23 ]
    ffffddae9a6a70d3-ffffddae9a6a70d8  6 bytes - win32kbase!CInputSink::MarkInvalid+13 (+0x3173)
    [ ff 15 df 9e 1d 00:e8 c8 b1 23 00 90 ]
    ffffddae9a6a713a-ffffddae9a6a713b  2 bytes - win32kbase!CompositionInputObject::LockForWrite+2a (+0x67)
    [ 48 ff:4c 8b ]
    ffffddae9a6a7141-ffffddae9a6a7144  4 bytes - win32kbase!CompositionInputObject::LockForWrite+31 (+0x07)
    [ 0f 1f 44 00:e8 da b2 23 ]
    ffffddae9a6a7195-ffffddae9a6a719a  6 bytes - win32kbase!CPushLock::AcquireLockExclusive+15 (+0x54)
    [ ff 15 1d 9e 1d 00:e8 06 b1 23 00 90 ]
    ffffddae9a6a719f-ffffddae9a6a71a0  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+1f (+0x0a)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71a6-ffffddae9a6a71a9  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+26 (+0x07)
    [ 0f 1f 44 00:e8 75 b2 23 ]
    ffffddae9a6a71b1-ffffddae9a6a71b2  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+31 (+0x0b)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71b8-ffffddae9a6a71bb  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+38 (+0x07)
    [ 0f 1f 44 00:e8 63 b2 23 ]
    ffffddae9a6abc5a-ffffddae9a6abc5b  2 bytes - win32kbase!MarkImmersiveProcess+5a (+0x4aa2)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc61-ffffddae9a6abc64  4 bytes - win32kbase!MarkImmersiveProcess+61 (+0x07)
    [ 0f 1f 44 00:e8 ba 67 23 ]
    ffffddae9a6abc6e-ffffddae9a6abc6f  2 bytes - win32kbase!MarkImmersiveProcess+6e (+0x0d)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc75-ffffddae9a6abc78  4 bytes - win32kbase!MarkImmersiveProcess+75 (+0x07)
    [ 0f 1f 44 00:e8 a6 67 23 ]
    ffffddae9a6abcc6-ffffddae9a6abcc7  2 bytes - win32kbase!MarkImmersiveProcess+c6 (+0x51)
    [ 48 ff:4c 8b ]
    ffffddae9a6abccd-ffffddae9a6abcd0  4 bytes - win32kbase!MarkImmersiveProcess+cd (+0x07)
    [ 0f 1f 44 00:e8 4e 67 23 ]
    ffffddae9a6abcd6-ffffddae9a6abcd7  2 bytes - win32kbase!MarkImmersiveProcess+d6 (+0x09)
    [ 48 ff:4c 8b ]
    ffffddae9a6abcdd-ffffddae9a6abce0  4 bytes - win32kbase!MarkImmersiveProcess+dd (+0x07)
    [ 0f 1f 44 00:e8 3e 67 23 ]
    ffffddae9a6ac0ce-ffffddae9a6ac0d3  6 bytes - win32kbase!CInputSink::IsLockValid+e (+0x3f1)
    [ ff 15 e4 4e 1d 00:e8 cd 61 23 00 90 ]
    ffffddae9a6ac10c-ffffddae9a6ac111  6 bytes - win32kbase!IsGetLayeredOrRedirectedParentSupported+10 (+0x3e)
    [ ff 15 a6 4e 1d 00:e8 8f 61 23 00 90 ]
    ffffddae9a6ac163-ffffddae9a6ac164  2 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+33 (+0x57)
    [ 48 ff:4c 8b ]
    ffffddae9a6ac16a-ffffddae9a6ac16d  4 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+3a (+0x07)
    [ 0f 1f 44 00:e8 b1 62 23 ]
    ffffddae9a6b809e-ffffddae9a6b80a3  6 bytes - win32kbase!CInputSink::Delete+2e (+0xbf34)
    [ ff 15 14 8f 1c 00:e8 fd a1 22 00 90 ]
    ffffddae9a6b80b2-ffffddae9a6b80b7  6 bytes - win32kbase!CInputSink::Delete+42 (+0x14)
    [ ff 15 00 8f 1c 00:e8 e9 a1 22 00 90 ]
    ffffddae9a6c0a2a-ffffddae9a6c0a2b  2 bytes - win32kbase!CInpLockGuard::UnLock+1a (+0x8978)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a31-ffffddae9a6c0a34  4 bytes - win32kbase!CInpLockGuard::UnLock+21 (+0x07)
    [ 0f 1f 44 00:e8 ea 19 22 ]
    ffffddae9a6c0a60-ffffddae9a6c0a61  2 bytes - win32kbase!CInpLockGuard::isOwned+10 (+0x2f)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a67-ffffddae9a6c0a6a  4 bytes - win32kbase!CInpLockGuard::isOwned+17 (+0x07)
    [ 0f 1f 44 00:e8 b4 19 22 ]
    ffffddae9a6c0a75-ffffddae9a6c0a76  2 bytes - win32kbase!CInpLockGuard::isOwned+25 (+0x0e)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a7c-ffffddae9a6c0a7f  4 bytes - win32kbase!CInpLockGuard::isOwned+2c (+0x07)
    [ 0f 1f 44 00:e8 9f 19 22 ]
    ffffddae9a6c0ac8-ffffddae9a6c0ac9  2 bytes - win32kbase!SetGlobalCursorLevel+28 (+0x4c)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0acf-ffffddae9a6c0ad2  4 bytes - win32kbase!SetGlobalCursorLevel+2f (+0x07)
    [ 0f 1f 44 00:e8 4c 19 22 ]
    ffffddae9a7489df-ffffddae9a7489e0  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+2f (+0x87f10)
    [ 48 ff:4c 8b ]
    ffffddae9a7489e6-ffffddae9a7489e9  4 bytes - win32kbase!NtUserUnloadKeyboardLayout+36 (+0x07)
    [ 0f 1f 44 00:e8 35 9a 19 ]
    ffffddae9a7489f5-ffffddae9a7489f6  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+45 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffddae9a7489fc - win32kbase!NtUserUnloadKeyboardLayout+4c (+0x07)
    [ 0f:e8 ]
    ffffddae9a7489fe-ffffddae9a7489ff  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+4e (+0x02)
    [ 44 00:9a 19 ]
    ffffddae9a748a29-ffffddae9a748a2a  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+79 (+0x2b)
    [ 48 ff:4c 8b ]
164 errors : !win32kbase (ffffddae9a645679-ffffddae9a748a2a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa85aac444
Arg3: 000000000000001d
Arg4: ffffaa89e2699b00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  EpicGamesLaunc

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8006a072c08 to fffff80069ff3ea0

STACK_TEXT:
ffffaa89`e2699958 fffff800`6a072c08 : 00000000`0000001a 00000000`00061941 00007ffa`85aac444 00000000`0000001d : nt!KeBugCheckEx
ffffaa89`e2699960 fffff800`6a00205e : ffffad88`53bbe080 00000000`00000000 ffffffff`ffff63c0 00000000`00000000 : nt!MmAccessFault+0x184488
ffffaa89`e2699b00 00007ffa`85aac444 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`f2e2fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`85aac444


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80069f963ae-fffff80069f963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:e0 fb f7 ef ]
4 errors : !nt (fffff80069f963ae-fffff80069f963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Bir gündür mavi ekran vermedi. Daha önce de ramleri tek tek takıp denediğim oldu sonuç aynı, o şekilde de mavi ekran vermişti.
Hataların hepsi RAM ile alakalı Memtest86 testini geçmesi sorunsuz oldukları anlamına gelmiyor o yüzden bir tanesini çıkarıp öyle test edin sistemi.
Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80017863aa0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff800`17863aa0 4883ec28        sub     rsp,28h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff800176620ab to fffff800175f3ea0

STACK_TEXT:
ffffa388`f62cab68 fffff800`176620ab : 00000000`00000001 fffff800`17863aa0 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa388`f62cab70 fffff800`17466dd5 : ffffd784`583e7140 00000000`00000080 ffffd784`58283040 00000000`00490055 : nt!ExpWorkerThread+0x1a029b
ffffa388`f62cac10 fffff800`175fb4f8 : ffffc680`a1d40180 ffffd784`583e7140 fffff800`17466d80 0020006b`0061006d : nt!PspSystemThreadStartup+0x55
ffffa388`f62cac60 00000000`00000000 : ffffa388`f62cb000 ffffa388`f62c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .bugcheck ; kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800175963ae-fffff800175963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:20 7e fc f8 ]
4 errors : !nt (fffff800175963ae-fffff800175963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffaa9965ac4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd809c5a8b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
+3318fa474849359
00007ffa`a9965ac4 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80152005e69 to fffff80151ff3ea0

STACK_TEXT:
fffffd80`9c5a89b8 fffff801`52005e69 : 00000000`00000001 00007ffa`a9965ac4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffffd80`9c5a89c0 fffff801`52005d33 : ffffb508`d2c80080 ffffb508`d2c80080 00000140`5d50f778 00000000`00000020 : nt!KiBugCheckDispatch+0x69
fffffd80`9c5a8b00 00007ffa`a9965ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000003b`f467f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a9965ac4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffb4a910e047a2-ffffb4a910e047a3  2 bytes - win32kbase!DxgkEngVisRgnUniq+12
    [ 48 ff:4c 8b ]
    ffffb4a910e047a9-ffffb4a910e047ac  4 bytes - win32kbase!DxgkEngVisRgnUniq+19 (+0x07)
    [ 0f 1f 44 00:e8 72 dc 2d ]
    ffffb4a910e047ec-ffffb4a910e047ed  2 bytes - win32kbase!DxgkEngVisRgnUniq+5c (+0x43)
    [ 48 ff:4c 8b ]
    ffffb4a910e047f3-ffffb4a910e047f6  4 bytes - win32kbase!DxgkEngVisRgnUniq+63 (+0x07)
    [ 0f 1f 44 00:e8 28 dc 2d ]
    ffffb4a910e047f8-ffffb4a910e047f9  2 bytes - win32kbase!DxgkEngVisRgnUniq+68 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e047ff-ffffb4a910e04802  4 bytes - win32kbase!DxgkEngVisRgnUniq+6f (+0x07)
    [ 0f 1f 44 00:e8 1c dc 2d ]
    ffffb4a910e19c77-ffffb4a910e19c7c  6 bytes - win32kbase!GreDeleteObject+d7 (+0x15478)
    [ ff 15 3b 73 26 00:e8 24 86 2c 00 90 ]
    ffffb4a910e19c92-ffffb4a910e19c97  6 bytes - win32kbase!GreDeleteObject+f2 (+0x1b)
    [ ff 15 20 73 26 00:e8 09 86 2c 00 90 ]
    ffffb4a910e37348-ffffb4a910e3734d  6 bytes - win32kbase!DxgkEngAssertGdiOutput+98 (+0x1d6b6)
    [ ff 15 6a 9c 24 00:e8 53 af 2a 00 90 ]
    ffffb4a910e378b3-ffffb4a910e378b4  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+33 (+0x56b)
    [ 48 ff:4c 8b ]
    ffffb4a910e378ba-ffffb4a910e378bd  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+3a (+0x07)
    [ 0f 1f 44 00:e8 61 ab 2a ]
    ffffb4a910e378c9-ffffb4a910e378ca  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e378d0-ffffb4a910e378d3  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+50 (+0x07)
    [ 0f 1f 44 00:e8 4b ab 2a ]
    ffffb4a910e37900-ffffb4a910e37901  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+80 (+0x30)
    [ 48 ff:4c 8b ]
    ffffb4a910e37907-ffffb4a910e3790a  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+87 (+0x07)
    [ 0f 1f 44 00:e8 14 ab 2a ]
    ffffb4a910e37914-ffffb4a910e37915  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+94 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffb4a910e3791b-ffffb4a910e3791e  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+9b (+0x07)
    [ 0f 1f 44 00:e8 00 ab 2a ]
    ffffb4a910e3792e-ffffb4a910e3792f  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+ae (+0x13)
    [ 48 ff:4c 8b ]
    ffffb4a910e37935-ffffb4a910e37938  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+b5 (+0x07)
    [ 0f 1f 44 00:e8 e6 aa 2a ]
    ffffb4a910e3795d-ffffb4a910e3795e  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+dd (+0x28)
    [ 48 ff:4c 8b ]
    ffffb4a910e37964-ffffb4a910e37967  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 b7 aa 2a ]
    ffffb4a910e37973-ffffb4a910e37974  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+f3 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e3797a-ffffb4a910e3797d  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+fa (+0x07)
    [ 0f 1f 44 00:e8 a1 aa 2a ]
    ffffb4a910e37bcf-ffffb4a910e37bd0  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+6f (+0x255)
    [ 48 ff:4c 8b ]
    ffffb4a910e37bd6-ffffb4a910e37bd9  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+76 (+0x07)
    [ 0f 1f 44 00:e8 45 a8 2a ]
    ffffb4a910e37bdb-ffffb4a910e37bdc  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+7b (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37be2-ffffb4a910e37be5  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+82 (+0x07)
    [ 0f 1f 44 00:e8 39 a8 2a ]
    ffffb4a910e37c06-ffffb4a910e37c07  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+a6 (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c0d-ffffb4a910e37c10  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+ad (+0x07)
    [ 0f 1f 44 00:e8 0e a8 2a ]
    ffffb4a910e37c12-ffffb4a910e37c13  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b2 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c19-ffffb4a910e37c1c  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b9 (+0x07)
    [ 0f 1f 44 00:e8 02 a8 2a ]
    ffffb4a910e37c3d-ffffb4a910e37c3e  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+dd (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c44-ffffb4a910e37c47  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 d7 a7 2a ]
    ffffb4a910e37c49-ffffb4a910e37c4a  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e9 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c50-ffffb4a910e37c53  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+f0 (+0x07)
    [ 0f 1f 44 00:e8 cb a7 2a ]
    ffffb4a910e54ada-ffffb4a910e54adb  2 bytes - win32kbase!GreCombineRgn+8a (+0x1ce8a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54ae1-ffffb4a910e54ae4  4 bytes - win32kbase!GreCombineRgn+91 (+0x07)
    [ 0f 1f 44 00:e8 3a d9 28 ]
    ffffb4a910e54aeb-ffffb4a910e54aec  2 bytes - win32kbase!GreCombineRgn+9b (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54af2-ffffb4a910e54af5  4 bytes - win32kbase!GreCombineRgn+a2 (+0x07)
    [ 0f 1f 44 00:e8 29 d9 28 ]
    ffffb4a910e54b0c-ffffb4a910e54b0d  2 bytes - win32kbase!GreCombineRgn+bc (+0x1a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b13-ffffb4a910e54b16  4 bytes - win32kbase!GreCombineRgn+c3 (+0x07)
    [ 0f 1f 44 00:e8 08 d9 28 ]
    ffffb4a910e54b1d-ffffb4a910e54b1e  2 bytes - win32kbase!GreCombineRgn+cd (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b24-ffffb4a910e54b27  4 bytes - win32kbase!GreCombineRgn+d4 (+0x07)
    [ 0f 1f 44 00:e8 f7 d8 28 ]
    ffffb4a910e54b46-ffffb4a910e54b47  2 bytes - win32kbase!GreCombineRgn+f6 (+0x22)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b4d-ffffb4a910e54b4f  3 bytes - win32kbase!GreCombineRgn+fd (+0x07)
    [ 0f 1f 44:e8 ce d8 ]
    ffffb4a910e66a29-ffffb4a910e66a2a  2 bytes - win32kbase!UserEnterUserCritSecShared+29 (+0x11edc)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a30-ffffb4a910e66a33  4 bytes - win32kbase!UserEnterUserCritSecShared+30 (+0x07)
    [ 0f 1f 44 00:e8 eb b9 27 ]
    ffffb4a910e66a3f-ffffb4a910e66a40  2 bytes - win32kbase!UserEnterUserCritSecShared+3f (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a46-ffffb4a910e66a49  4 bytes - win32kbase!UserEnterUserCritSecShared+46 (+0x07)
    [ 0f 1f 44 00:e8 d5 b9 27 ]
    ffffb4a910e66a71-ffffb4a910e66a72  2 bytes - win32kbase!UserEnterUserCritSecShared+71 (+0x2b)
    [ 48 ff:4c 8b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
289 errors : !win32kbase (ffffb4a910e047a2-ffffb4a9110044a9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffde81ecdf9a90, Address of resource
Arg2: ffffde81f2c8e080, Address of thread
Arg3: ffffde81f1955710, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xE3

PROCESS_NAME:  SystemSettings

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8055b26bc89 to fffff8055b1f3ea0

STACK_TEXT:
ffffb18f`a78a0918 fffff805`5b26bc89 : 00000000`000000e3 ffffde81`ecdf9a90 ffffde81`f2c8e080 ffffde81`f1955710 : nt!KeBugCheckEx
ffffb18f`a78a0920 fffff805`5b0e1ef9 : ffffde81`ecdf9a90 ffffb18f`a78a0ec0 00000000`00000000 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x18b909
ffffb18f`a78a09e0 ffffddae`9a664cf4 : 00000000`00000000 00000000`00000000 ffffddd7`06121010 fffff805`5b0cbad2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffffb18f`a78a0a40 ffffddae`9a74892e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001042 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffffb18f`a78a0ab0 ffffddae`9aa6dbd1 : ffffde81`f2c8e080 ffffb18f`00000000 ffffddd7`06121010 00000000`00000000 : win32kbase!NtUserSystemParametersInfo+0x119e
ffffb18f`a78a0e00 fffff805`5b2058b8 : ffffde81`f2c8e080 ffffde81`f0abbbe0 ffffb18f`00000000 ffffb18f`a543eb80 : win32k!NtUserSystemParametersInfo+0x15
ffffb18f`a78a0e40 00007ff8`b3901884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`7017e158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b3901884


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffddae9a645679-ffffddae9a64567e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 39 b9 23 00:e8 22 cc 29 00 90 ]
    ffffddae9a645692-ffffddae9a645697  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 20 b9 23 00:e8 09 cc 29 00 90 ]
    ffffddae9a6456db-ffffddae9a6456dc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffffddae9a6456e2-ffffddae9a6456e5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 39 cd 29 ]
    ffffddae9a645723-ffffddae9a645728  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
    ffffddae9a64574f-ffffddae9a645754  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
    ffffddae9a664d14-ffffddae9a664d15  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1f5c5)
    [ 48 ff:4c 8b ]
    ffffddae9a664d1b-ffffddae9a664d1e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 00 d7 27 ]
    ffffddae9a6a3f31 - win32kbase!PopAndFreeAlwaysW32ThreadLock+15 (+0x3f216)
    [ 00:90 ]
    ffffddae9a6a3f59-ffffddae9a6a3f5a  2 bytes - win32kbase!UpdatesLockedForDwm+19 (+0x28)
    [ 48 ff:4c 8b ]
    ffffddae9a6a3f60-ffffddae9a6a3f63  4 bytes - win32kbase!UpdatesLockedForDwm+20 (+0x07)
    [ 0f 1f 44 00:e8 bb e4 23 ]
    ffffddae9a6a70d3-ffffddae9a6a70d8  6 bytes - win32kbase!CInputSink::MarkInvalid+13 (+0x3173)
    [ ff 15 df 9e 1d 00:e8 c8 b1 23 00 90 ]
    ffffddae9a6a713a-ffffddae9a6a713b  2 bytes - win32kbase!CompositionInputObject::LockForWrite+2a (+0x67)
    [ 48 ff:4c 8b ]
    ffffddae9a6a7141-ffffddae9a6a7144  4 bytes - win32kbase!CompositionInputObject::LockForWrite+31 (+0x07)
    [ 0f 1f 44 00:e8 da b2 23 ]
    ffffddae9a6a7195-ffffddae9a6a719a  6 bytes - win32kbase!CPushLock::AcquireLockExclusive+15 (+0x54)
    [ ff 15 1d 9e 1d 00:e8 06 b1 23 00 90 ]
    ffffddae9a6a719f-ffffddae9a6a71a0  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+1f (+0x0a)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71a6-ffffddae9a6a71a9  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+26 (+0x07)
    [ 0f 1f 44 00:e8 75 b2 23 ]
    ffffddae9a6a71b1-ffffddae9a6a71b2  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+31 (+0x0b)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71b8-ffffddae9a6a71bb  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+38 (+0x07)
    [ 0f 1f 44 00:e8 63 b2 23 ]
    ffffddae9a6abc5a-ffffddae9a6abc5b  2 bytes - win32kbase!MarkImmersiveProcess+5a (+0x4aa2)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc61-ffffddae9a6abc64  4 bytes - win32kbase!MarkImmersiveProcess+61 (+0x07)
    [ 0f 1f 44 00:e8 ba 67 23 ]
    ffffddae9a6abc6e-ffffddae9a6abc6f  2 bytes - win32kbase!MarkImmersiveProcess+6e (+0x0d)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc75-ffffddae9a6abc78  4 bytes - win32kbase!MarkImmersiveProcess+75 (+0x07)
    [ 0f 1f 44 00:e8 a6 67 23 ]
    ffffddae9a6abcc6-ffffddae9a6abcc7  2 bytes - win32kbase!MarkImmersiveProcess+c6 (+0x51)
    [ 48 ff:4c 8b ]
    ffffddae9a6abccd-ffffddae9a6abcd0  4 bytes - win32kbase!MarkImmersiveProcess+cd (+0x07)
    [ 0f 1f 44 00:e8 4e 67 23 ]
    ffffddae9a6abcd6-ffffddae9a6abcd7  2 bytes - win32kbase!MarkImmersiveProcess+d6 (+0x09)
    [ 48 ff:4c 8b ]
    ffffddae9a6abcdd-ffffddae9a6abce0  4 bytes - win32kbase!MarkImmersiveProcess+dd (+0x07)
    [ 0f 1f 44 00:e8 3e 67 23 ]
    ffffddae9a6ac0ce-ffffddae9a6ac0d3  6 bytes - win32kbase!CInputSink::IsLockValid+e (+0x3f1)
    [ ff 15 e4 4e 1d 00:e8 cd 61 23 00 90 ]
    ffffddae9a6ac10c-ffffddae9a6ac111  6 bytes - win32kbase!IsGetLayeredOrRedirectedParentSupported+10 (+0x3e)
    [ ff 15 a6 4e 1d 00:e8 8f 61 23 00 90 ]
    ffffddae9a6ac163-ffffddae9a6ac164  2 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+33 (+0x57)
    [ 48 ff:4c 8b ]
    ffffddae9a6ac16a-ffffddae9a6ac16d  4 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+3a (+0x07)
    [ 0f 1f 44 00:e8 b1 62 23 ]
    ffffddae9a6b809e-ffffddae9a6b80a3  6 bytes - win32kbase!CInputSink::Delete+2e (+0xbf34)
    [ ff 15 14 8f 1c 00:e8 fd a1 22 00 90 ]
    ffffddae9a6b80b2-ffffddae9a6b80b7  6 bytes - win32kbase!CInputSink::Delete+42 (+0x14)
    [ ff 15 00 8f 1c 00:e8 e9 a1 22 00 90 ]
    ffffddae9a6c0a2a-ffffddae9a6c0a2b  2 bytes - win32kbase!CInpLockGuard::UnLock+1a (+0x8978)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a31-ffffddae9a6c0a34  4 bytes - win32kbase!CInpLockGuard::UnLock+21 (+0x07)
    [ 0f 1f 44 00:e8 ea 19 22 ]
    ffffddae9a6c0a60-ffffddae9a6c0a61  2 bytes - win32kbase!CInpLockGuard::isOwned+10 (+0x2f)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a67-ffffddae9a6c0a6a  4 bytes - win32kbase!CInpLockGuard::isOwned+17 (+0x07)
    [ 0f 1f 44 00:e8 b4 19 22 ]
    ffffddae9a6c0a75-ffffddae9a6c0a76  2 bytes - win32kbase!CInpLockGuard::isOwned+25 (+0x0e)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a7c-ffffddae9a6c0a7f  4 bytes - win32kbase!CInpLockGuard::isOwned+2c (+0x07)
    [ 0f 1f 44 00:e8 9f 19 22 ]
    ffffddae9a6c0ac8-ffffddae9a6c0ac9  2 bytes - win32kbase!SetGlobalCursorLevel+28 (+0x4c)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0acf-ffffddae9a6c0ad2  4 bytes - win32kbase!SetGlobalCursorLevel+2f (+0x07)
    [ 0f 1f 44 00:e8 4c 19 22 ]
    ffffddae9a7489df-ffffddae9a7489e0  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+2f (+0x87f10)
    [ 48 ff:4c 8b ]
    ffffddae9a7489e6-ffffddae9a7489e9  4 bytes - win32kbase!NtUserUnloadKeyboardLayout+36 (+0x07)
    [ 0f 1f 44 00:e8 35 9a 19 ]
    ffffddae9a7489f5-ffffddae9a7489f6  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+45 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffddae9a7489fc - win32kbase!NtUserUnloadKeyboardLayout+4c (+0x07)
    [ 0f:e8 ]
    ffffddae9a7489fe-ffffddae9a7489ff  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+4e (+0x02)
    [ 44 00:9a 19 ]
    ffffddae9a748a29-ffffddae9a748a2a  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+79 (+0x2b)
    [ 48 ff:4c 8b ]
164 errors : !win32kbase (ffffddae9a645679-ffffddae9a748a2a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa85aac444
Arg3: 000000000000001d
Arg4: ffffaa89e2699b00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  EpicGamesLaunc

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8006a072c08 to fffff80069ff3ea0

STACK_TEXT:
ffffaa89`e2699958 fffff800`6a072c08 : 00000000`0000001a 00000000`00061941 00007ffa`85aac444 00000000`0000001d : nt!KeBugCheckEx
ffffaa89`e2699960 fffff800`6a00205e : ffffad88`53bbe080 00000000`00000000 ffffffff`ffff63c0 00000000`00000000 : nt!MmAccessFault+0x184488
ffffaa89`e2699b00 00007ffa`85aac444 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`f2e2fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`85aac444


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80069f963ae-fffff80069f963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:e0 fb f7 ef ]
4 errors : !nt (fffff80069f963ae-fffff80069f963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Dediğiniz doğru olabilir. Dünden beri hiç mavi ekran almadım ve bu durum garibime gitti. Cpu-Z ile bi RAM lerin frekansına bakayım dedim ve gördümki takılı olan 16Gb RAM, programda 8 gb gözüküyor ama kasa içinde RAM lerin ışıkları yanıyor. Ramler corsair veangence pro 8*2 3200mhz GB. Dün geceden beri tek 8 GB ram ile çalışıyormuş pc. Galiba sorun RAM de. Memtest86 da 4 saatde sorun çıkmamıştı oysa ki.
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı