3 Gündür Mavi Ekran Sorunu minidump

H4C1..

Decapat
Katılım
4 Mart 2019
Mesajlar
27
Merhaba iyi günler. 3 gündür farklı hatalar ile mavi ekran alıyorum. DDU ile ekran kartı driverini silip tekrar güncel bir şekilde kurdum. BIOS güncelledim. OCCT testine soktum. Memtest86 testinde 4 saat tarama yaptı ama temiz çıktı. Sorunlu parçanın hangisi olduğunu bulamıyorum, bir bulsam garantiye vereceğim. Yardımcı olursanız çok sevinirim. Elimden başka bir şey gelmiyor artık.

Minidump dosyası: İndir minidump rar
 

Dosya Ekleri

  • 9451887f-6de8-46ce-8e29-26c72b0419d4.jpg
    9451887f-6de8-46ce-8e29-26c72b0419d4.jpg
    193,6 KB · Görüntüleme: 57
Hataların hepsi RAM ile alakalı Memtest86 testini geçmesi sorunsuz oldukları anlamına gelmiyor o yüzden bir tanesini çıkarıp öyle test edin sistemi.
Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80017863aa0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff800`17863aa0 4883ec28        sub     rsp,28h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff800176620ab to fffff800175f3ea0

STACK_TEXT:
ffffa388`f62cab68 fffff800`176620ab : 00000000`00000001 fffff800`17863aa0 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa388`f62cab70 fffff800`17466dd5 : ffffd784`583e7140 00000000`00000080 ffffd784`58283040 00000000`00490055 : nt!ExpWorkerThread+0x1a029b
ffffa388`f62cac10 fffff800`175fb4f8 : ffffc680`a1d40180 ffffd784`583e7140 fffff800`17466d80 0020006b`0061006d : nt!PspSystemThreadStartup+0x55
ffffa388`f62cac60 00000000`00000000 : ffffa388`f62cb000 ffffa388`f62c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .bugcheck ; kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800175963ae-fffff800175963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:20 7e fc f8 ]
4 errors : !nt (fffff800175963ae-fffff800175963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffaa9965ac4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd809c5a8b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
+3318fa474849359
00007ffa`a9965ac4 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80152005e69 to fffff80151ff3ea0

STACK_TEXT:
fffffd80`9c5a89b8 fffff801`52005e69 : 00000000`00000001 00007ffa`a9965ac4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffffd80`9c5a89c0 fffff801`52005d33 : ffffb508`d2c80080 ffffb508`d2c80080 00000140`5d50f778 00000000`00000020 : nt!KiBugCheckDispatch+0x69
fffffd80`9c5a8b00 00007ffa`a9965ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000003b`f467f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a9965ac4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffb4a910e047a2-ffffb4a910e047a3  2 bytes - win32kbase!DxgkEngVisRgnUniq+12
    [ 48 ff:4c 8b ]
    ffffb4a910e047a9-ffffb4a910e047ac  4 bytes - win32kbase!DxgkEngVisRgnUniq+19 (+0x07)
    [ 0f 1f 44 00:e8 72 dc 2d ]
    ffffb4a910e047ec-ffffb4a910e047ed  2 bytes - win32kbase!DxgkEngVisRgnUniq+5c (+0x43)
    [ 48 ff:4c 8b ]
    ffffb4a910e047f3-ffffb4a910e047f6  4 bytes - win32kbase!DxgkEngVisRgnUniq+63 (+0x07)
    [ 0f 1f 44 00:e8 28 dc 2d ]
    ffffb4a910e047f8-ffffb4a910e047f9  2 bytes - win32kbase!DxgkEngVisRgnUniq+68 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e047ff-ffffb4a910e04802  4 bytes - win32kbase!DxgkEngVisRgnUniq+6f (+0x07)
    [ 0f 1f 44 00:e8 1c dc 2d ]
    ffffb4a910e19c77-ffffb4a910e19c7c  6 bytes - win32kbase!GreDeleteObject+d7 (+0x15478)
    [ ff 15 3b 73 26 00:e8 24 86 2c 00 90 ]
    ffffb4a910e19c92-ffffb4a910e19c97  6 bytes - win32kbase!GreDeleteObject+f2 (+0x1b)
    [ ff 15 20 73 26 00:e8 09 86 2c 00 90 ]
    ffffb4a910e37348-ffffb4a910e3734d  6 bytes - win32kbase!DxgkEngAssertGdiOutput+98 (+0x1d6b6)
    [ ff 15 6a 9c 24 00:e8 53 af 2a 00 90 ]
    ffffb4a910e378b3-ffffb4a910e378b4  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+33 (+0x56b)
    [ 48 ff:4c 8b ]
    ffffb4a910e378ba-ffffb4a910e378bd  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+3a (+0x07)
    [ 0f 1f 44 00:e8 61 ab 2a ]
    ffffb4a910e378c9-ffffb4a910e378ca  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e378d0-ffffb4a910e378d3  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+50 (+0x07)
    [ 0f 1f 44 00:e8 4b ab 2a ]
    ffffb4a910e37900-ffffb4a910e37901  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+80 (+0x30)
    [ 48 ff:4c 8b ]
    ffffb4a910e37907-ffffb4a910e3790a  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+87 (+0x07)
    [ 0f 1f 44 00:e8 14 ab 2a ]
    ffffb4a910e37914-ffffb4a910e37915  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+94 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffb4a910e3791b-ffffb4a910e3791e  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+9b (+0x07)
    [ 0f 1f 44 00:e8 00 ab 2a ]
    ffffb4a910e3792e-ffffb4a910e3792f  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+ae (+0x13)
    [ 48 ff:4c 8b ]
    ffffb4a910e37935-ffffb4a910e37938  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+b5 (+0x07)
    [ 0f 1f 44 00:e8 e6 aa 2a ]
    ffffb4a910e3795d-ffffb4a910e3795e  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+dd (+0x28)
    [ 48 ff:4c 8b ]
    ffffb4a910e37964-ffffb4a910e37967  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 b7 aa 2a ]
    ffffb4a910e37973-ffffb4a910e37974  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+f3 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e3797a-ffffb4a910e3797d  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+fa (+0x07)
    [ 0f 1f 44 00:e8 a1 aa 2a ]
    ffffb4a910e37bcf-ffffb4a910e37bd0  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+6f (+0x255)
    [ 48 ff:4c 8b ]
    ffffb4a910e37bd6-ffffb4a910e37bd9  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+76 (+0x07)
    [ 0f 1f 44 00:e8 45 a8 2a ]
    ffffb4a910e37bdb-ffffb4a910e37bdc  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+7b (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37be2-ffffb4a910e37be5  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+82 (+0x07)
    [ 0f 1f 44 00:e8 39 a8 2a ]
    ffffb4a910e37c06-ffffb4a910e37c07  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+a6 (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c0d-ffffb4a910e37c10  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+ad (+0x07)
    [ 0f 1f 44 00:e8 0e a8 2a ]
    ffffb4a910e37c12-ffffb4a910e37c13  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b2 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c19-ffffb4a910e37c1c  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b9 (+0x07)
    [ 0f 1f 44 00:e8 02 a8 2a ]
    ffffb4a910e37c3d-ffffb4a910e37c3e  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+dd (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c44-ffffb4a910e37c47  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 d7 a7 2a ]
    ffffb4a910e37c49-ffffb4a910e37c4a  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e9 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c50-ffffb4a910e37c53  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+f0 (+0x07)
    [ 0f 1f 44 00:e8 cb a7 2a ]
    ffffb4a910e54ada-ffffb4a910e54adb  2 bytes - win32kbase!GreCombineRgn+8a (+0x1ce8a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54ae1-ffffb4a910e54ae4  4 bytes - win32kbase!GreCombineRgn+91 (+0x07)
    [ 0f 1f 44 00:e8 3a d9 28 ]
    ffffb4a910e54aeb-ffffb4a910e54aec  2 bytes - win32kbase!GreCombineRgn+9b (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54af2-ffffb4a910e54af5  4 bytes - win32kbase!GreCombineRgn+a2 (+0x07)
    [ 0f 1f 44 00:e8 29 d9 28 ]
    ffffb4a910e54b0c-ffffb4a910e54b0d  2 bytes - win32kbase!GreCombineRgn+bc (+0x1a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b13-ffffb4a910e54b16  4 bytes - win32kbase!GreCombineRgn+c3 (+0x07)
    [ 0f 1f 44 00:e8 08 d9 28 ]
    ffffb4a910e54b1d-ffffb4a910e54b1e  2 bytes - win32kbase!GreCombineRgn+cd (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b24-ffffb4a910e54b27  4 bytes - win32kbase!GreCombineRgn+d4 (+0x07)
    [ 0f 1f 44 00:e8 f7 d8 28 ]
    ffffb4a910e54b46-ffffb4a910e54b47  2 bytes - win32kbase!GreCombineRgn+f6 (+0x22)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b4d-ffffb4a910e54b4f  3 bytes - win32kbase!GreCombineRgn+fd (+0x07)
    [ 0f 1f 44:e8 ce d8 ]
    ffffb4a910e66a29-ffffb4a910e66a2a  2 bytes - win32kbase!UserEnterUserCritSecShared+29 (+0x11edc)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a30-ffffb4a910e66a33  4 bytes - win32kbase!UserEnterUserCritSecShared+30 (+0x07)
    [ 0f 1f 44 00:e8 eb b9 27 ]
    ffffb4a910e66a3f-ffffb4a910e66a40  2 bytes - win32kbase!UserEnterUserCritSecShared+3f (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a46-ffffb4a910e66a49  4 bytes - win32kbase!UserEnterUserCritSecShared+46 (+0x07)
    [ 0f 1f 44 00:e8 d5 b9 27 ]
    ffffb4a910e66a71-ffffb4a910e66a72  2 bytes - win32kbase!UserEnterUserCritSecShared+71 (+0x2b)
    [ 48 ff:4c 8b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
289 errors : !win32kbase (ffffb4a910e047a2-ffffb4a9110044a9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffde81ecdf9a90, Address of resource
Arg2: ffffde81f2c8e080, Address of thread
Arg3: ffffde81f1955710, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xE3

PROCESS_NAME:  SystemSettings

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8055b26bc89 to fffff8055b1f3ea0

STACK_TEXT:
ffffb18f`a78a0918 fffff805`5b26bc89 : 00000000`000000e3 ffffde81`ecdf9a90 ffffde81`f2c8e080 ffffde81`f1955710 : nt!KeBugCheckEx
ffffb18f`a78a0920 fffff805`5b0e1ef9 : ffffde81`ecdf9a90 ffffb18f`a78a0ec0 00000000`00000000 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x18b909
ffffb18f`a78a09e0 ffffddae`9a664cf4 : 00000000`00000000 00000000`00000000 ffffddd7`06121010 fffff805`5b0cbad2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffffb18f`a78a0a40 ffffddae`9a74892e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001042 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffffb18f`a78a0ab0 ffffddae`9aa6dbd1 : ffffde81`f2c8e080 ffffb18f`00000000 ffffddd7`06121010 00000000`00000000 : win32kbase!NtUserSystemParametersInfo+0x119e
ffffb18f`a78a0e00 fffff805`5b2058b8 : ffffde81`f2c8e080 ffffde81`f0abbbe0 ffffb18f`00000000 ffffb18f`a543eb80 : win32k!NtUserSystemParametersInfo+0x15
ffffb18f`a78a0e40 00007ff8`b3901884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`7017e158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b3901884


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffddae9a645679-ffffddae9a64567e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 39 b9 23 00:e8 22 cc 29 00 90 ]
    ffffddae9a645692-ffffddae9a645697  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 20 b9 23 00:e8 09 cc 29 00 90 ]
    ffffddae9a6456db-ffffddae9a6456dc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffffddae9a6456e2-ffffddae9a6456e5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 39 cd 29 ]
    ffffddae9a645723-ffffddae9a645728  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
    ffffddae9a64574f-ffffddae9a645754  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
    ffffddae9a664d14-ffffddae9a664d15  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1f5c5)
    [ 48 ff:4c 8b ]
    ffffddae9a664d1b-ffffddae9a664d1e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 00 d7 27 ]
    ffffddae9a6a3f31 - win32kbase!PopAndFreeAlwaysW32ThreadLock+15 (+0x3f216)
    [ 00:90 ]
    ffffddae9a6a3f59-ffffddae9a6a3f5a  2 bytes - win32kbase!UpdatesLockedForDwm+19 (+0x28)
    [ 48 ff:4c 8b ]
    ffffddae9a6a3f60-ffffddae9a6a3f63  4 bytes - win32kbase!UpdatesLockedForDwm+20 (+0x07)
    [ 0f 1f 44 00:e8 bb e4 23 ]
    ffffddae9a6a70d3-ffffddae9a6a70d8  6 bytes - win32kbase!CInputSink::MarkInvalid+13 (+0x3173)
    [ ff 15 df 9e 1d 00:e8 c8 b1 23 00 90 ]
    ffffddae9a6a713a-ffffddae9a6a713b  2 bytes - win32kbase!CompositionInputObject::LockForWrite+2a (+0x67)
    [ 48 ff:4c 8b ]
    ffffddae9a6a7141-ffffddae9a6a7144  4 bytes - win32kbase!CompositionInputObject::LockForWrite+31 (+0x07)
    [ 0f 1f 44 00:e8 da b2 23 ]
    ffffddae9a6a7195-ffffddae9a6a719a  6 bytes - win32kbase!CPushLock::AcquireLockExclusive+15 (+0x54)
    [ ff 15 1d 9e 1d 00:e8 06 b1 23 00 90 ]
    ffffddae9a6a719f-ffffddae9a6a71a0  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+1f (+0x0a)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71a6-ffffddae9a6a71a9  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+26 (+0x07)
    [ 0f 1f 44 00:e8 75 b2 23 ]
    ffffddae9a6a71b1-ffffddae9a6a71b2  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+31 (+0x0b)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71b8-ffffddae9a6a71bb  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+38 (+0x07)
    [ 0f 1f 44 00:e8 63 b2 23 ]
    ffffddae9a6abc5a-ffffddae9a6abc5b  2 bytes - win32kbase!MarkImmersiveProcess+5a (+0x4aa2)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc61-ffffddae9a6abc64  4 bytes - win32kbase!MarkImmersiveProcess+61 (+0x07)
    [ 0f 1f 44 00:e8 ba 67 23 ]
    ffffddae9a6abc6e-ffffddae9a6abc6f  2 bytes - win32kbase!MarkImmersiveProcess+6e (+0x0d)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc75-ffffddae9a6abc78  4 bytes - win32kbase!MarkImmersiveProcess+75 (+0x07)
    [ 0f 1f 44 00:e8 a6 67 23 ]
    ffffddae9a6abcc6-ffffddae9a6abcc7  2 bytes - win32kbase!MarkImmersiveProcess+c6 (+0x51)
    [ 48 ff:4c 8b ]
    ffffddae9a6abccd-ffffddae9a6abcd0  4 bytes - win32kbase!MarkImmersiveProcess+cd (+0x07)
    [ 0f 1f 44 00:e8 4e 67 23 ]
    ffffddae9a6abcd6-ffffddae9a6abcd7  2 bytes - win32kbase!MarkImmersiveProcess+d6 (+0x09)
    [ 48 ff:4c 8b ]
    ffffddae9a6abcdd-ffffddae9a6abce0  4 bytes - win32kbase!MarkImmersiveProcess+dd (+0x07)
    [ 0f 1f 44 00:e8 3e 67 23 ]
    ffffddae9a6ac0ce-ffffddae9a6ac0d3  6 bytes - win32kbase!CInputSink::IsLockValid+e (+0x3f1)
    [ ff 15 e4 4e 1d 00:e8 cd 61 23 00 90 ]
    ffffddae9a6ac10c-ffffddae9a6ac111  6 bytes - win32kbase!IsGetLayeredOrRedirectedParentSupported+10 (+0x3e)
    [ ff 15 a6 4e 1d 00:e8 8f 61 23 00 90 ]
    ffffddae9a6ac163-ffffddae9a6ac164  2 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+33 (+0x57)
    [ 48 ff:4c 8b ]
    ffffddae9a6ac16a-ffffddae9a6ac16d  4 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+3a (+0x07)
    [ 0f 1f 44 00:e8 b1 62 23 ]
    ffffddae9a6b809e-ffffddae9a6b80a3  6 bytes - win32kbase!CInputSink::Delete+2e (+0xbf34)
    [ ff 15 14 8f 1c 00:e8 fd a1 22 00 90 ]
    ffffddae9a6b80b2-ffffddae9a6b80b7  6 bytes - win32kbase!CInputSink::Delete+42 (+0x14)
    [ ff 15 00 8f 1c 00:e8 e9 a1 22 00 90 ]
    ffffddae9a6c0a2a-ffffddae9a6c0a2b  2 bytes - win32kbase!CInpLockGuard::UnLock+1a (+0x8978)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a31-ffffddae9a6c0a34  4 bytes - win32kbase!CInpLockGuard::UnLock+21 (+0x07)
    [ 0f 1f 44 00:e8 ea 19 22 ]
    ffffddae9a6c0a60-ffffddae9a6c0a61  2 bytes - win32kbase!CInpLockGuard::isOwned+10 (+0x2f)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a67-ffffddae9a6c0a6a  4 bytes - win32kbase!CInpLockGuard::isOwned+17 (+0x07)
    [ 0f 1f 44 00:e8 b4 19 22 ]
    ffffddae9a6c0a75-ffffddae9a6c0a76  2 bytes - win32kbase!CInpLockGuard::isOwned+25 (+0x0e)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a7c-ffffddae9a6c0a7f  4 bytes - win32kbase!CInpLockGuard::isOwned+2c (+0x07)
    [ 0f 1f 44 00:e8 9f 19 22 ]
    ffffddae9a6c0ac8-ffffddae9a6c0ac9  2 bytes - win32kbase!SetGlobalCursorLevel+28 (+0x4c)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0acf-ffffddae9a6c0ad2  4 bytes - win32kbase!SetGlobalCursorLevel+2f (+0x07)
    [ 0f 1f 44 00:e8 4c 19 22 ]
    ffffddae9a7489df-ffffddae9a7489e0  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+2f (+0x87f10)
    [ 48 ff:4c 8b ]
    ffffddae9a7489e6-ffffddae9a7489e9  4 bytes - win32kbase!NtUserUnloadKeyboardLayout+36 (+0x07)
    [ 0f 1f 44 00:e8 35 9a 19 ]
    ffffddae9a7489f5-ffffddae9a7489f6  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+45 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffddae9a7489fc - win32kbase!NtUserUnloadKeyboardLayout+4c (+0x07)
    [ 0f:e8 ]
    ffffddae9a7489fe-ffffddae9a7489ff  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+4e (+0x02)
    [ 44 00:9a 19 ]
    ffffddae9a748a29-ffffddae9a748a2a  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+79 (+0x2b)
    [ 48 ff:4c 8b ]
164 errors : !win32kbase (ffffddae9a645679-ffffddae9a748a2a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa85aac444
Arg3: 000000000000001d
Arg4: ffffaa89e2699b00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  EpicGamesLaunc

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8006a072c08 to fffff80069ff3ea0

STACK_TEXT:
ffffaa89`e2699958 fffff800`6a072c08 : 00000000`0000001a 00000000`00061941 00007ffa`85aac444 00000000`0000001d : nt!KeBugCheckEx
ffffaa89`e2699960 fffff800`6a00205e : ffffad88`53bbe080 00000000`00000000 ffffffff`ffff63c0 00000000`00000000 : nt!MmAccessFault+0x184488
ffffaa89`e2699b00 00007ffa`85aac444 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`f2e2fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`85aac444


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80069f963ae-fffff80069f963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:e0 fb f7 ef ]
4 errors : !nt (fffff80069f963ae-fffff80069f963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Hocam meraktan soruyorum kaç GB raminiz vardı?
Corsair Veangence pro 8*2GB 3200mhz.
Hataların hepsi RAM ile alakalı Memtest86 testini geçmesi sorunsuz oldukları anlamına gelmiyor o yüzden bir tanesini çıkarıp öyle test edin sistemi.
Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80017863aa0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff800`17863aa0 4883ec28        sub     rsp,28h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff800176620ab to fffff800175f3ea0

STACK_TEXT:
ffffa388`f62cab68 fffff800`176620ab : 00000000`00000001 fffff800`17863aa0 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa388`f62cab70 fffff800`17466dd5 : ffffd784`583e7140 00000000`00000080 ffffd784`58283040 00000000`00490055 : nt!ExpWorkerThread+0x1a029b
ffffa388`f62cac10 fffff800`175fb4f8 : ffffc680`a1d40180 ffffd784`583e7140 fffff800`17466d80 0020006b`0061006d : nt!PspSystemThreadStartup+0x55
ffffa388`f62cac60 00000000`00000000 : ffffa388`f62cb000 ffffa388`f62c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .bugcheck ; kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800175963ae-fffff800175963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:20 7e fc f8 ]
4 errors : !nt (fffff800175963ae-fffff800175963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffaa9965ac4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd809c5a8b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
+3318fa474849359
00007ffa`a9965ac4 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80152005e69 to fffff80151ff3ea0

STACK_TEXT:
fffffd80`9c5a89b8 fffff801`52005e69 : 00000000`00000001 00007ffa`a9965ac4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffffd80`9c5a89c0 fffff801`52005d33 : ffffb508`d2c80080 ffffb508`d2c80080 00000140`5d50f778 00000000`00000020 : nt!KiBugCheckDispatch+0x69
fffffd80`9c5a8b00 00007ffa`a9965ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000003b`f467f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a9965ac4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffb4a910e047a2-ffffb4a910e047a3  2 bytes - win32kbase!DxgkEngVisRgnUniq+12
    [ 48 ff:4c 8b ]
    ffffb4a910e047a9-ffffb4a910e047ac  4 bytes - win32kbase!DxgkEngVisRgnUniq+19 (+0x07)
    [ 0f 1f 44 00:e8 72 dc 2d ]
    ffffb4a910e047ec-ffffb4a910e047ed  2 bytes - win32kbase!DxgkEngVisRgnUniq+5c (+0x43)
    [ 48 ff:4c 8b ]
    ffffb4a910e047f3-ffffb4a910e047f6  4 bytes - win32kbase!DxgkEngVisRgnUniq+63 (+0x07)
    [ 0f 1f 44 00:e8 28 dc 2d ]
    ffffb4a910e047f8-ffffb4a910e047f9  2 bytes - win32kbase!DxgkEngVisRgnUniq+68 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e047ff-ffffb4a910e04802  4 bytes - win32kbase!DxgkEngVisRgnUniq+6f (+0x07)
    [ 0f 1f 44 00:e8 1c dc 2d ]
    ffffb4a910e19c77-ffffb4a910e19c7c  6 bytes - win32kbase!GreDeleteObject+d7 (+0x15478)
    [ ff 15 3b 73 26 00:e8 24 86 2c 00 90 ]
    ffffb4a910e19c92-ffffb4a910e19c97  6 bytes - win32kbase!GreDeleteObject+f2 (+0x1b)
    [ ff 15 20 73 26 00:e8 09 86 2c 00 90 ]
    ffffb4a910e37348-ffffb4a910e3734d  6 bytes - win32kbase!DxgkEngAssertGdiOutput+98 (+0x1d6b6)
    [ ff 15 6a 9c 24 00:e8 53 af 2a 00 90 ]
    ffffb4a910e378b3-ffffb4a910e378b4  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+33 (+0x56b)
    [ 48 ff:4c 8b ]
    ffffb4a910e378ba-ffffb4a910e378bd  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+3a (+0x07)
    [ 0f 1f 44 00:e8 61 ab 2a ]
    ffffb4a910e378c9-ffffb4a910e378ca  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e378d0-ffffb4a910e378d3  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+50 (+0x07)
    [ 0f 1f 44 00:e8 4b ab 2a ]
    ffffb4a910e37900-ffffb4a910e37901  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+80 (+0x30)
    [ 48 ff:4c 8b ]
    ffffb4a910e37907-ffffb4a910e3790a  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+87 (+0x07)
    [ 0f 1f 44 00:e8 14 ab 2a ]
    ffffb4a910e37914-ffffb4a910e37915  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+94 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffb4a910e3791b-ffffb4a910e3791e  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+9b (+0x07)
    [ 0f 1f 44 00:e8 00 ab 2a ]
    ffffb4a910e3792e-ffffb4a910e3792f  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+ae (+0x13)
    [ 48 ff:4c 8b ]
    ffffb4a910e37935-ffffb4a910e37938  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+b5 (+0x07)
    [ 0f 1f 44 00:e8 e6 aa 2a ]
    ffffb4a910e3795d-ffffb4a910e3795e  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+dd (+0x28)
    [ 48 ff:4c 8b ]
    ffffb4a910e37964-ffffb4a910e37967  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 b7 aa 2a ]
    ffffb4a910e37973-ffffb4a910e37974  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+f3 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e3797a-ffffb4a910e3797d  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+fa (+0x07)
    [ 0f 1f 44 00:e8 a1 aa 2a ]
    ffffb4a910e37bcf-ffffb4a910e37bd0  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+6f (+0x255)
    [ 48 ff:4c 8b ]
    ffffb4a910e37bd6-ffffb4a910e37bd9  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+76 (+0x07)
    [ 0f 1f 44 00:e8 45 a8 2a ]
    ffffb4a910e37bdb-ffffb4a910e37bdc  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+7b (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37be2-ffffb4a910e37be5  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+82 (+0x07)
    [ 0f 1f 44 00:e8 39 a8 2a ]
    ffffb4a910e37c06-ffffb4a910e37c07  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+a6 (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c0d-ffffb4a910e37c10  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+ad (+0x07)
    [ 0f 1f 44 00:e8 0e a8 2a ]
    ffffb4a910e37c12-ffffb4a910e37c13  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b2 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c19-ffffb4a910e37c1c  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b9 (+0x07)
    [ 0f 1f 44 00:e8 02 a8 2a ]
    ffffb4a910e37c3d-ffffb4a910e37c3e  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+dd (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c44-ffffb4a910e37c47  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 d7 a7 2a ]
    ffffb4a910e37c49-ffffb4a910e37c4a  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e9 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c50-ffffb4a910e37c53  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+f0 (+0x07)
    [ 0f 1f 44 00:e8 cb a7 2a ]
    ffffb4a910e54ada-ffffb4a910e54adb  2 bytes - win32kbase!GreCombineRgn+8a (+0x1ce8a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54ae1-ffffb4a910e54ae4  4 bytes - win32kbase!GreCombineRgn+91 (+0x07)
    [ 0f 1f 44 00:e8 3a d9 28 ]
    ffffb4a910e54aeb-ffffb4a910e54aec  2 bytes - win32kbase!GreCombineRgn+9b (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54af2-ffffb4a910e54af5  4 bytes - win32kbase!GreCombineRgn+a2 (+0x07)
    [ 0f 1f 44 00:e8 29 d9 28 ]
    ffffb4a910e54b0c-ffffb4a910e54b0d  2 bytes - win32kbase!GreCombineRgn+bc (+0x1a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b13-ffffb4a910e54b16  4 bytes - win32kbase!GreCombineRgn+c3 (+0x07)
    [ 0f 1f 44 00:e8 08 d9 28 ]
    ffffb4a910e54b1d-ffffb4a910e54b1e  2 bytes - win32kbase!GreCombineRgn+cd (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b24-ffffb4a910e54b27  4 bytes - win32kbase!GreCombineRgn+d4 (+0x07)
    [ 0f 1f 44 00:e8 f7 d8 28 ]
    ffffb4a910e54b46-ffffb4a910e54b47  2 bytes - win32kbase!GreCombineRgn+f6 (+0x22)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b4d-ffffb4a910e54b4f  3 bytes - win32kbase!GreCombineRgn+fd (+0x07)
    [ 0f 1f 44:e8 ce d8 ]
    ffffb4a910e66a29-ffffb4a910e66a2a  2 bytes - win32kbase!UserEnterUserCritSecShared+29 (+0x11edc)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a30-ffffb4a910e66a33  4 bytes - win32kbase!UserEnterUserCritSecShared+30 (+0x07)
    [ 0f 1f 44 00:e8 eb b9 27 ]
    ffffb4a910e66a3f-ffffb4a910e66a40  2 bytes - win32kbase!UserEnterUserCritSecShared+3f (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a46-ffffb4a910e66a49  4 bytes - win32kbase!UserEnterUserCritSecShared+46 (+0x07)
    [ 0f 1f 44 00:e8 d5 b9 27 ]
    ffffb4a910e66a71-ffffb4a910e66a72  2 bytes - win32kbase!UserEnterUserCritSecShared+71 (+0x2b)
    [ 48 ff:4c 8b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
289 errors : !win32kbase (ffffb4a910e047a2-ffffb4a9110044a9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffde81ecdf9a90, Address of resource
Arg2: ffffde81f2c8e080, Address of thread
Arg3: ffffde81f1955710, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xE3

PROCESS_NAME:  SystemSettings

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8055b26bc89 to fffff8055b1f3ea0

STACK_TEXT:
ffffb18f`a78a0918 fffff805`5b26bc89 : 00000000`000000e3 ffffde81`ecdf9a90 ffffde81`f2c8e080 ffffde81`f1955710 : nt!KeBugCheckEx
ffffb18f`a78a0920 fffff805`5b0e1ef9 : ffffde81`ecdf9a90 ffffb18f`a78a0ec0 00000000`00000000 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x18b909
ffffb18f`a78a09e0 ffffddae`9a664cf4 : 00000000`00000000 00000000`00000000 ffffddd7`06121010 fffff805`5b0cbad2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffffb18f`a78a0a40 ffffddae`9a74892e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001042 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffffb18f`a78a0ab0 ffffddae`9aa6dbd1 : ffffde81`f2c8e080 ffffb18f`00000000 ffffddd7`06121010 00000000`00000000 : win32kbase!NtUserSystemParametersInfo+0x119e
ffffb18f`a78a0e00 fffff805`5b2058b8 : ffffde81`f2c8e080 ffffde81`f0abbbe0 ffffb18f`00000000 ffffb18f`a543eb80 : win32k!NtUserSystemParametersInfo+0x15
ffffb18f`a78a0e40 00007ff8`b3901884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`7017e158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b3901884


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffddae9a645679-ffffddae9a64567e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 39 b9 23 00:e8 22 cc 29 00 90 ]
    ffffddae9a645692-ffffddae9a645697  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 20 b9 23 00:e8 09 cc 29 00 90 ]
    ffffddae9a6456db-ffffddae9a6456dc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffffddae9a6456e2-ffffddae9a6456e5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 39 cd 29 ]
    ffffddae9a645723-ffffddae9a645728  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
    ffffddae9a64574f-ffffddae9a645754  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
    ffffddae9a664d14-ffffddae9a664d15  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1f5c5)
    [ 48 ff:4c 8b ]
    ffffddae9a664d1b-ffffddae9a664d1e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 00 d7 27 ]
    ffffddae9a6a3f31 - win32kbase!PopAndFreeAlwaysW32ThreadLock+15 (+0x3f216)
    [ 00:90 ]
    ffffddae9a6a3f59-ffffddae9a6a3f5a  2 bytes - win32kbase!UpdatesLockedForDwm+19 (+0x28)
    [ 48 ff:4c 8b ]
    ffffddae9a6a3f60-ffffddae9a6a3f63  4 bytes - win32kbase!UpdatesLockedForDwm+20 (+0x07)
    [ 0f 1f 44 00:e8 bb e4 23 ]
    ffffddae9a6a70d3-ffffddae9a6a70d8  6 bytes - win32kbase!CInputSink::MarkInvalid+13 (+0x3173)
    [ ff 15 df 9e 1d 00:e8 c8 b1 23 00 90 ]
    ffffddae9a6a713a-ffffddae9a6a713b  2 bytes - win32kbase!CompositionInputObject::LockForWrite+2a (+0x67)
    [ 48 ff:4c 8b ]
    ffffddae9a6a7141-ffffddae9a6a7144  4 bytes - win32kbase!CompositionInputObject::LockForWrite+31 (+0x07)
    [ 0f 1f 44 00:e8 da b2 23 ]
    ffffddae9a6a7195-ffffddae9a6a719a  6 bytes - win32kbase!CPushLock::AcquireLockExclusive+15 (+0x54)
    [ ff 15 1d 9e 1d 00:e8 06 b1 23 00 90 ]
    ffffddae9a6a719f-ffffddae9a6a71a0  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+1f (+0x0a)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71a6-ffffddae9a6a71a9  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+26 (+0x07)
    [ 0f 1f 44 00:e8 75 b2 23 ]
    ffffddae9a6a71b1-ffffddae9a6a71b2  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+31 (+0x0b)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71b8-ffffddae9a6a71bb  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+38 (+0x07)
    [ 0f 1f 44 00:e8 63 b2 23 ]
    ffffddae9a6abc5a-ffffddae9a6abc5b  2 bytes - win32kbase!MarkImmersiveProcess+5a (+0x4aa2)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc61-ffffddae9a6abc64  4 bytes - win32kbase!MarkImmersiveProcess+61 (+0x07)
    [ 0f 1f 44 00:e8 ba 67 23 ]
    ffffddae9a6abc6e-ffffddae9a6abc6f  2 bytes - win32kbase!MarkImmersiveProcess+6e (+0x0d)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc75-ffffddae9a6abc78  4 bytes - win32kbase!MarkImmersiveProcess+75 (+0x07)
    [ 0f 1f 44 00:e8 a6 67 23 ]
    ffffddae9a6abcc6-ffffddae9a6abcc7  2 bytes - win32kbase!MarkImmersiveProcess+c6 (+0x51)
    [ 48 ff:4c 8b ]
    ffffddae9a6abccd-ffffddae9a6abcd0  4 bytes - win32kbase!MarkImmersiveProcess+cd (+0x07)
    [ 0f 1f 44 00:e8 4e 67 23 ]
    ffffddae9a6abcd6-ffffddae9a6abcd7  2 bytes - win32kbase!MarkImmersiveProcess+d6 (+0x09)
    [ 48 ff:4c 8b ]
    ffffddae9a6abcdd-ffffddae9a6abce0  4 bytes - win32kbase!MarkImmersiveProcess+dd (+0x07)
    [ 0f 1f 44 00:e8 3e 67 23 ]
    ffffddae9a6ac0ce-ffffddae9a6ac0d3  6 bytes - win32kbase!CInputSink::IsLockValid+e (+0x3f1)
    [ ff 15 e4 4e 1d 00:e8 cd 61 23 00 90 ]
    ffffddae9a6ac10c-ffffddae9a6ac111  6 bytes - win32kbase!IsGetLayeredOrRedirectedParentSupported+10 (+0x3e)
    [ ff 15 a6 4e 1d 00:e8 8f 61 23 00 90 ]
    ffffddae9a6ac163-ffffddae9a6ac164  2 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+33 (+0x57)
    [ 48 ff:4c 8b ]
    ffffddae9a6ac16a-ffffddae9a6ac16d  4 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+3a (+0x07)
    [ 0f 1f 44 00:e8 b1 62 23 ]
    ffffddae9a6b809e-ffffddae9a6b80a3  6 bytes - win32kbase!CInputSink::Delete+2e (+0xbf34)
    [ ff 15 14 8f 1c 00:e8 fd a1 22 00 90 ]
    ffffddae9a6b80b2-ffffddae9a6b80b7  6 bytes - win32kbase!CInputSink::Delete+42 (+0x14)
    [ ff 15 00 8f 1c 00:e8 e9 a1 22 00 90 ]
    ffffddae9a6c0a2a-ffffddae9a6c0a2b  2 bytes - win32kbase!CInpLockGuard::UnLock+1a (+0x8978)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a31-ffffddae9a6c0a34  4 bytes - win32kbase!CInpLockGuard::UnLock+21 (+0x07)
    [ 0f 1f 44 00:e8 ea 19 22 ]
    ffffddae9a6c0a60-ffffddae9a6c0a61  2 bytes - win32kbase!CInpLockGuard::isOwned+10 (+0x2f)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a67-ffffddae9a6c0a6a  4 bytes - win32kbase!CInpLockGuard::isOwned+17 (+0x07)
    [ 0f 1f 44 00:e8 b4 19 22 ]
    ffffddae9a6c0a75-ffffddae9a6c0a76  2 bytes - win32kbase!CInpLockGuard::isOwned+25 (+0x0e)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a7c-ffffddae9a6c0a7f  4 bytes - win32kbase!CInpLockGuard::isOwned+2c (+0x07)
    [ 0f 1f 44 00:e8 9f 19 22 ]
    ffffddae9a6c0ac8-ffffddae9a6c0ac9  2 bytes - win32kbase!SetGlobalCursorLevel+28 (+0x4c)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0acf-ffffddae9a6c0ad2  4 bytes - win32kbase!SetGlobalCursorLevel+2f (+0x07)
    [ 0f 1f 44 00:e8 4c 19 22 ]
    ffffddae9a7489df-ffffddae9a7489e0  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+2f (+0x87f10)
    [ 48 ff:4c 8b ]
    ffffddae9a7489e6-ffffddae9a7489e9  4 bytes - win32kbase!NtUserUnloadKeyboardLayout+36 (+0x07)
    [ 0f 1f 44 00:e8 35 9a 19 ]
    ffffddae9a7489f5-ffffddae9a7489f6  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+45 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffddae9a7489fc - win32kbase!NtUserUnloadKeyboardLayout+4c (+0x07)
    [ 0f:e8 ]
    ffffddae9a7489fe-ffffddae9a7489ff  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+4e (+0x02)
    [ 44 00:9a 19 ]
    ffffddae9a748a29-ffffddae9a748a2a  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+79 (+0x2b)
    [ 48 ff:4c 8b ]
164 errors : !win32kbase (ffffddae9a645679-ffffddae9a748a2a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa85aac444
Arg3: 000000000000001d
Arg4: ffffaa89e2699b00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  EpicGamesLaunc

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8006a072c08 to fffff80069ff3ea0

STACK_TEXT:
ffffaa89`e2699958 fffff800`6a072c08 : 00000000`0000001a 00000000`00061941 00007ffa`85aac444 00000000`0000001d : nt!KeBugCheckEx
ffffaa89`e2699960 fffff800`6a00205e : ffffad88`53bbe080 00000000`00000000 ffffffff`ffff63c0 00000000`00000000 : nt!MmAccessFault+0x184488
ffffaa89`e2699b00 00007ffa`85aac444 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`f2e2fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`85aac444


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80069f963ae-fffff80069f963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:e0 fb f7 ef ]
4 errors : !nt (fffff80069f963ae-fffff80069f963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Bir gündür mavi ekran vermedi. Daha önce de ramleri tek tek takıp denediğim oldu sonuç aynı, o şekilde de mavi ekran vermişti.
Hataların hepsi RAM ile alakalı Memtest86 testini geçmesi sorunsuz oldukları anlamına gelmiyor o yüzden bir tanesini çıkarıp öyle test edin sistemi.
Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80017863aa0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff800`17863aa0 4883ec28        sub     rsp,28h

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff800176620ab to fffff800175f3ea0

STACK_TEXT:
ffffa388`f62cab68 fffff800`176620ab : 00000000`00000001 fffff800`17863aa0 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffa388`f62cab70 fffff800`17466dd5 : ffffd784`583e7140 00000000`00000080 ffffd784`58283040 00000000`00490055 : nt!ExpWorkerThread+0x1a029b
ffffa388`f62cac10 fffff800`175fb4f8 : ffffc680`a1d40180 ffffd784`583e7140 fffff800`17466d80 0020006b`0061006d : nt!PspSystemThreadStartup+0x55
ffffa388`f62cac60 00000000`00000000 : ffffa388`f62cb000 ffffa388`f62c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .bugcheck ; kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800175963ae-fffff800175963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:20 7e fc f8 ]
4 errors : !nt (fffff800175963ae-fffff800175963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffaa9965ac4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffffd809c5a8b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


FAULTING_IP:
+3318fa474849359
00007ffa`a9965ac4 ??              ???

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x1

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80152005e69 to fffff80151ff3ea0

STACK_TEXT:
fffffd80`9c5a89b8 fffff801`52005e69 : 00000000`00000001 00007ffa`a9965ac4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffffd80`9c5a89c0 fffff801`52005d33 : ffffb508`d2c80080 ffffb508`d2c80080 00000140`5d50f778 00000000`00000020 : nt!KiBugCheckDispatch+0x69
fffffd80`9c5a8b00 00007ffa`a9965ac4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000003b`f467f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a9965ac4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffb4a910e047a2-ffffb4a910e047a3  2 bytes - win32kbase!DxgkEngVisRgnUniq+12
    [ 48 ff:4c 8b ]
    ffffb4a910e047a9-ffffb4a910e047ac  4 bytes - win32kbase!DxgkEngVisRgnUniq+19 (+0x07)
    [ 0f 1f 44 00:e8 72 dc 2d ]
    ffffb4a910e047ec-ffffb4a910e047ed  2 bytes - win32kbase!DxgkEngVisRgnUniq+5c (+0x43)
    [ 48 ff:4c 8b ]
    ffffb4a910e047f3-ffffb4a910e047f6  4 bytes - win32kbase!DxgkEngVisRgnUniq+63 (+0x07)
    [ 0f 1f 44 00:e8 28 dc 2d ]
    ffffb4a910e047f8-ffffb4a910e047f9  2 bytes - win32kbase!DxgkEngVisRgnUniq+68 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e047ff-ffffb4a910e04802  4 bytes - win32kbase!DxgkEngVisRgnUniq+6f (+0x07)
    [ 0f 1f 44 00:e8 1c dc 2d ]
    ffffb4a910e19c77-ffffb4a910e19c7c  6 bytes - win32kbase!GreDeleteObject+d7 (+0x15478)
    [ ff 15 3b 73 26 00:e8 24 86 2c 00 90 ]
    ffffb4a910e19c92-ffffb4a910e19c97  6 bytes - win32kbase!GreDeleteObject+f2 (+0x1b)
    [ ff 15 20 73 26 00:e8 09 86 2c 00 90 ]
    ffffb4a910e37348-ffffb4a910e3734d  6 bytes - win32kbase!DxgkEngAssertGdiOutput+98 (+0x1d6b6)
    [ ff 15 6a 9c 24 00:e8 53 af 2a 00 90 ]
    ffffb4a910e378b3-ffffb4a910e378b4  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+33 (+0x56b)
    [ 48 ff:4c 8b ]
    ffffb4a910e378ba-ffffb4a910e378bd  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+3a (+0x07)
    [ 0f 1f 44 00:e8 61 ab 2a ]
    ffffb4a910e378c9-ffffb4a910e378ca  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e378d0-ffffb4a910e378d3  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+50 (+0x07)
    [ 0f 1f 44 00:e8 4b ab 2a ]
    ffffb4a910e37900-ffffb4a910e37901  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+80 (+0x30)
    [ 48 ff:4c 8b ]
    ffffb4a910e37907-ffffb4a910e3790a  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+87 (+0x07)
    [ 0f 1f 44 00:e8 14 ab 2a ]
    ffffb4a910e37914-ffffb4a910e37915  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+94 (+0x0d)
    [ 48 ff:4c 8b ]
    ffffb4a910e3791b-ffffb4a910e3791e  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+9b (+0x07)
    [ 0f 1f 44 00:e8 00 ab 2a ]
    ffffb4a910e3792e-ffffb4a910e3792f  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+ae (+0x13)
    [ 48 ff:4c 8b ]
    ffffb4a910e37935-ffffb4a910e37938  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+b5 (+0x07)
    [ 0f 1f 44 00:e8 e6 aa 2a ]
    ffffb4a910e3795d-ffffb4a910e3795e  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+dd (+0x28)
    [ 48 ff:4c 8b ]
    ffffb4a910e37964-ffffb4a910e37967  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 b7 aa 2a ]
    ffffb4a910e37973-ffffb4a910e37974  2 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+f3 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e3797a-ffffb4a910e3797d  4 bytes - win32kbase!DxgkEngAcquireWin32kAndPDEVLocks+fa (+0x07)
    [ 0f 1f 44 00:e8 a1 aa 2a ]
    ffffb4a910e37bcf-ffffb4a910e37bd0  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+6f (+0x255)
    [ 48 ff:4c 8b ]
    ffffb4a910e37bd6-ffffb4a910e37bd9  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+76 (+0x07)
    [ 0f 1f 44 00:e8 45 a8 2a ]
    ffffb4a910e37bdb-ffffb4a910e37bdc  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+7b (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37be2-ffffb4a910e37be5  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+82 (+0x07)
    [ 0f 1f 44 00:e8 39 a8 2a ]
    ffffb4a910e37c06-ffffb4a910e37c07  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+a6 (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c0d-ffffb4a910e37c10  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+ad (+0x07)
    [ 0f 1f 44 00:e8 0e a8 2a ]
    ffffb4a910e37c12-ffffb4a910e37c13  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b2 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c19-ffffb4a910e37c1c  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+b9 (+0x07)
    [ 0f 1f 44 00:e8 02 a8 2a ]
    ffffb4a910e37c3d-ffffb4a910e37c3e  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+dd (+0x24)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c44-ffffb4a910e37c47  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e4 (+0x07)
    [ 0f 1f 44 00:e8 d7 a7 2a ]
    ffffb4a910e37c49-ffffb4a910e37c4a  2 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+e9 (+0x05)
    [ 48 ff:4c 8b ]
    ffffb4a910e37c50-ffffb4a910e37c53  4 bytes - win32kbase!DxgkEngReleaseWin32kAndPDEVLocks+f0 (+0x07)
    [ 0f 1f 44 00:e8 cb a7 2a ]
    ffffb4a910e54ada-ffffb4a910e54adb  2 bytes - win32kbase!GreCombineRgn+8a (+0x1ce8a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54ae1-ffffb4a910e54ae4  4 bytes - win32kbase!GreCombineRgn+91 (+0x07)
    [ 0f 1f 44 00:e8 3a d9 28 ]
    ffffb4a910e54aeb-ffffb4a910e54aec  2 bytes - win32kbase!GreCombineRgn+9b (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54af2-ffffb4a910e54af5  4 bytes - win32kbase!GreCombineRgn+a2 (+0x07)
    [ 0f 1f 44 00:e8 29 d9 28 ]
    ffffb4a910e54b0c-ffffb4a910e54b0d  2 bytes - win32kbase!GreCombineRgn+bc (+0x1a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b13-ffffb4a910e54b16  4 bytes - win32kbase!GreCombineRgn+c3 (+0x07)
    [ 0f 1f 44 00:e8 08 d9 28 ]
    ffffb4a910e54b1d-ffffb4a910e54b1e  2 bytes - win32kbase!GreCombineRgn+cd (+0x0a)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b24-ffffb4a910e54b27  4 bytes - win32kbase!GreCombineRgn+d4 (+0x07)
    [ 0f 1f 44 00:e8 f7 d8 28 ]
    ffffb4a910e54b46-ffffb4a910e54b47  2 bytes - win32kbase!GreCombineRgn+f6 (+0x22)
    [ 48 ff:4c 8b ]
    ffffb4a910e54b4d-ffffb4a910e54b4f  3 bytes - win32kbase!GreCombineRgn+fd (+0x07)
    [ 0f 1f 44:e8 ce d8 ]
    ffffb4a910e66a29-ffffb4a910e66a2a  2 bytes - win32kbase!UserEnterUserCritSecShared+29 (+0x11edc)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a30-ffffb4a910e66a33  4 bytes - win32kbase!UserEnterUserCritSecShared+30 (+0x07)
    [ 0f 1f 44 00:e8 eb b9 27 ]
    ffffb4a910e66a3f-ffffb4a910e66a40  2 bytes - win32kbase!UserEnterUserCritSecShared+3f (+0x0f)
    [ 48 ff:4c 8b ]
    ffffb4a910e66a46-ffffb4a910e66a49  4 bytes - win32kbase!UserEnterUserCritSecShared+46 (+0x07)
    [ 0f 1f 44 00:e8 d5 b9 27 ]
    ffffb4a910e66a71-ffffb4a910e66a72  2 bytes - win32kbase!UserEnterUserCritSecShared+71 (+0x2b)
    [ 48 ff:4c 8b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
289 errors : !win32kbase (ffffb4a910e047a2-ffffb4a9110044a9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
RESOURCE_NOT_OWNED (e3)
A thread tried to release a resource it did not own.
Arguments:
Arg1: ffffde81ecdf9a90, Address of resource
Arg2: ffffde81f2c8e080, Address of thread
Arg3: ffffde81f1955710, Address of owner table if there is one
Arg4: 0000000000000002

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xE3

PROCESS_NAME:  SystemSettings

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8055b26bc89 to fffff8055b1f3ea0

STACK_TEXT:
ffffb18f`a78a0918 fffff805`5b26bc89 : 00000000`000000e3 ffffde81`ecdf9a90 ffffde81`f2c8e080 ffffde81`f1955710 : nt!KeBugCheckEx
ffffb18f`a78a0920 fffff805`5b0e1ef9 : ffffde81`ecdf9a90 ffffb18f`a78a0ec0 00000000`00000000 00000000`00000000 : nt!ExpReleaseResourceSharedForThreadLite+0x18b909
ffffb18f`a78a09e0 ffffddae`9a664cf4 : 00000000`00000000 00000000`00000000 ffffddd7`06121010 fffff805`5b0cbad2 : nt!ExReleaseResourceAndLeaveCriticalRegion+0xc9
ffffb18f`a78a0a40 ffffddae`9a74892e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001042 : win32kbase!UserSessionSwitchLeaveCrit+0x74
ffffb18f`a78a0ab0 ffffddae`9aa6dbd1 : ffffde81`f2c8e080 ffffb18f`00000000 ffffddd7`06121010 00000000`00000000 : win32kbase!NtUserSystemParametersInfo+0x119e
ffffb18f`a78a0e00 fffff805`5b2058b8 : ffffde81`f2c8e080 ffffde81`f0abbbe0 ffffb18f`00000000 ffffb18f`a543eb80 : win32k!NtUserSystemParametersInfo+0x15
ffffb18f`a78a0e40 00007ff8`b3901884 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`7017e158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b3901884


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffddae9a645679-ffffddae9a64567e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 39 b9 23 00:e8 22 cc 29 00 90 ]
    ffffddae9a645692-ffffddae9a645697  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 20 b9 23 00:e8 09 cc 29 00 90 ]
    ffffddae9a6456db-ffffddae9a6456dc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffffddae9a6456e2-ffffddae9a6456e5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 39 cd 29 ]
    ffffddae9a645723-ffffddae9a645728  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
    ffffddae9a64574f-ffffddae9a645754  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
    ffffddae9a664d14-ffffddae9a664d15  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x1f5c5)
    [ 48 ff:4c 8b ]
    ffffddae9a664d1b-ffffddae9a664d1e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 00 d7 27 ]
    ffffddae9a6a3f31 - win32kbase!PopAndFreeAlwaysW32ThreadLock+15 (+0x3f216)
    [ 00:90 ]
    ffffddae9a6a3f59-ffffddae9a6a3f5a  2 bytes - win32kbase!UpdatesLockedForDwm+19 (+0x28)
    [ 48 ff:4c 8b ]
    ffffddae9a6a3f60-ffffddae9a6a3f63  4 bytes - win32kbase!UpdatesLockedForDwm+20 (+0x07)
    [ 0f 1f 44 00:e8 bb e4 23 ]
    ffffddae9a6a70d3-ffffddae9a6a70d8  6 bytes - win32kbase!CInputSink::MarkInvalid+13 (+0x3173)
    [ ff 15 df 9e 1d 00:e8 c8 b1 23 00 90 ]
    ffffddae9a6a713a-ffffddae9a6a713b  2 bytes - win32kbase!CompositionInputObject::LockForWrite+2a (+0x67)
    [ 48 ff:4c 8b ]
    ffffddae9a6a7141-ffffddae9a6a7144  4 bytes - win32kbase!CompositionInputObject::LockForWrite+31 (+0x07)
    [ 0f 1f 44 00:e8 da b2 23 ]
    ffffddae9a6a7195-ffffddae9a6a719a  6 bytes - win32kbase!CPushLock::AcquireLockExclusive+15 (+0x54)
    [ ff 15 1d 9e 1d 00:e8 06 b1 23 00 90 ]
    ffffddae9a6a719f-ffffddae9a6a71a0  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+1f (+0x0a)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71a6-ffffddae9a6a71a9  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+26 (+0x07)
    [ 0f 1f 44 00:e8 75 b2 23 ]
    ffffddae9a6a71b1-ffffddae9a6a71b2  2 bytes - win32kbase!CPushLock::AcquireLockExclusive+31 (+0x0b)
    [ 48 ff:4c 8b ]
    ffffddae9a6a71b8-ffffddae9a6a71bb  4 bytes - win32kbase!CPushLock::AcquireLockExclusive+38 (+0x07)
    [ 0f 1f 44 00:e8 63 b2 23 ]
    ffffddae9a6abc5a-ffffddae9a6abc5b  2 bytes - win32kbase!MarkImmersiveProcess+5a (+0x4aa2)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc61-ffffddae9a6abc64  4 bytes - win32kbase!MarkImmersiveProcess+61 (+0x07)
    [ 0f 1f 44 00:e8 ba 67 23 ]
    ffffddae9a6abc6e-ffffddae9a6abc6f  2 bytes - win32kbase!MarkImmersiveProcess+6e (+0x0d)
    [ 48 ff:4c 8b ]
    ffffddae9a6abc75-ffffddae9a6abc78  4 bytes - win32kbase!MarkImmersiveProcess+75 (+0x07)
    [ 0f 1f 44 00:e8 a6 67 23 ]
    ffffddae9a6abcc6-ffffddae9a6abcc7  2 bytes - win32kbase!MarkImmersiveProcess+c6 (+0x51)
    [ 48 ff:4c 8b ]
    ffffddae9a6abccd-ffffddae9a6abcd0  4 bytes - win32kbase!MarkImmersiveProcess+cd (+0x07)
    [ 0f 1f 44 00:e8 4e 67 23 ]
    ffffddae9a6abcd6-ffffddae9a6abcd7  2 bytes - win32kbase!MarkImmersiveProcess+d6 (+0x09)
    [ 48 ff:4c 8b ]
    ffffddae9a6abcdd-ffffddae9a6abce0  4 bytes - win32kbase!MarkImmersiveProcess+dd (+0x07)
    [ 0f 1f 44 00:e8 3e 67 23 ]
    ffffddae9a6ac0ce-ffffddae9a6ac0d3  6 bytes - win32kbase!CInputSink::IsLockValid+e (+0x3f1)
    [ ff 15 e4 4e 1d 00:e8 cd 61 23 00 90 ]
    ffffddae9a6ac10c-ffffddae9a6ac111  6 bytes - win32kbase!IsGetLayeredOrRedirectedParentSupported+10 (+0x3e)
    [ ff 15 a6 4e 1d 00:e8 8f 61 23 00 90 ]
    ffffddae9a6ac163-ffffddae9a6ac164  2 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+33 (+0x57)
    [ 48 ff:4c 8b ]
    ffffddae9a6ac16a-ffffddae9a6ac16d  4 bytes - win32kbase!DirectComposition::CVisualTargetMarshaler::ReleaseAllReferences+3a (+0x07)
    [ 0f 1f 44 00:e8 b1 62 23 ]
    ffffddae9a6b809e-ffffddae9a6b80a3  6 bytes - win32kbase!CInputSink::Delete+2e (+0xbf34)
    [ ff 15 14 8f 1c 00:e8 fd a1 22 00 90 ]
    ffffddae9a6b80b2-ffffddae9a6b80b7  6 bytes - win32kbase!CInputSink::Delete+42 (+0x14)
    [ ff 15 00 8f 1c 00:e8 e9 a1 22 00 90 ]
    ffffddae9a6c0a2a-ffffddae9a6c0a2b  2 bytes - win32kbase!CInpLockGuard::UnLock+1a (+0x8978)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a31-ffffddae9a6c0a34  4 bytes - win32kbase!CInpLockGuard::UnLock+21 (+0x07)
    [ 0f 1f 44 00:e8 ea 19 22 ]
    ffffddae9a6c0a60-ffffddae9a6c0a61  2 bytes - win32kbase!CInpLockGuard::isOwned+10 (+0x2f)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a67-ffffddae9a6c0a6a  4 bytes - win32kbase!CInpLockGuard::isOwned+17 (+0x07)
    [ 0f 1f 44 00:e8 b4 19 22 ]
    ffffddae9a6c0a75-ffffddae9a6c0a76  2 bytes - win32kbase!CInpLockGuard::isOwned+25 (+0x0e)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0a7c-ffffddae9a6c0a7f  4 bytes - win32kbase!CInpLockGuard::isOwned+2c (+0x07)
    [ 0f 1f 44 00:e8 9f 19 22 ]
    ffffddae9a6c0ac8-ffffddae9a6c0ac9  2 bytes - win32kbase!SetGlobalCursorLevel+28 (+0x4c)
    [ 48 ff:4c 8b ]
    ffffddae9a6c0acf-ffffddae9a6c0ad2  4 bytes - win32kbase!SetGlobalCursorLevel+2f (+0x07)
    [ 0f 1f 44 00:e8 4c 19 22 ]
    ffffddae9a7489df-ffffddae9a7489e0  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+2f (+0x87f10)
    [ 48 ff:4c 8b ]
    ffffddae9a7489e6-ffffddae9a7489e9  4 bytes - win32kbase!NtUserUnloadKeyboardLayout+36 (+0x07)
    [ 0f 1f 44 00:e8 35 9a 19 ]
    ffffddae9a7489f5-ffffddae9a7489f6  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+45 (+0x0f)
    [ 48 ff:4c 8b ]
    ffffddae9a7489fc - win32kbase!NtUserUnloadKeyboardLayout+4c (+0x07)
    [ 0f:e8 ]
    ffffddae9a7489fe-ffffddae9a7489ff  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+4e (+0x02)
    [ 44 00:9a 19 ]
    ffffddae9a748a29-ffffddae9a748a2a  2 bytes - win32kbase!NtUserUnloadKeyboardLayout+79 (+0x2b)
    [ 48 ff:4c 8b ]
164 errors : !win32kbase (ffffddae9a645679-ffffddae9a748a2a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ffa85aac444
Arg3: 000000000000001d
Arg4: ffffaa89e2699b00

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  EpicGamesLaunc

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8006a072c08 to fffff80069ff3ea0

STACK_TEXT:
ffffaa89`e2699958 fffff800`6a072c08 : 00000000`0000001a 00000000`00061941 00007ffa`85aac444 00000000`0000001d : nt!KeBugCheckEx
ffffaa89`e2699960 fffff800`6a00205e : ffffad88`53bbe080 00000000`00000000 ffffffff`ffff63c0 00000000`00000000 : nt!MmAccessFault+0x184488
ffffaa89`e2699b00 00007ffa`85aac444 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`f2e2fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`85aac444


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80069f963ae-fffff80069f963b1  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:e0 fb f7 ef ]
4 errors : !nt (fffff80069f963ae-fffff80069f963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Dediğiniz doğru olabilir. Dünden beri hiç mavi ekran almadım ve bu durum garibime gitti. Cpu-Z ile bi RAM lerin frekansına bakayım dedim ve gördümki takılı olan 16Gb RAM, programda 8 gb gözüküyor ama kasa içinde RAM lerin ışıkları yanıyor. Ramler corsair veangence pro 8*2 3200mhz GB. Dün geceden beri tek 8 GB ram ile çalışıyormuş pc. Galiba sorun RAM de. Memtest86 da 4 saatde sorun çıkmamıştı oysa ki.
 
Son düzenleme:

Geri
Yukarı