Video izlerken mavi ekran hatası

BlueMan23

Kilopat
Katılım
5 Eylül 2016
Mesajlar
954
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Sorunu yaklaşık 1 senedir yaşıyorum, başta bu kadar çok olmazken şu an kullanılmaz halde. Ne zaman olacağını bilmiyorum biri diğerinin zamanını tutmuyor. Oyun oynarken video, dizi izlerken her şekilde oluyor. Ayrıca oyunlarda ani FPS dropları yiyorum, videoları bile 720P-1080p 60 FPS izleyemiyorum sürekli kasıyor. Minidump dosya bağlantısını paylaşıyorum, incelerseniz sevinirim.
 
Kötü haber. RAM'leriniz bozuk...

"Chrome" silin. (Farklı bir tarayıcı kullanın önerim: Firefox veya Brave'dir. Edge'de olabilir.)
"Roblox" ile ilgili ne varsa silin.

CMD üzerinde sfc /scannow komutu uygulayın.

MemTest86 ile RAM'lerinizi test edip sonuçları paylaşın.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00000000350c3001
Arg3: 0000000000021b3c
Arg4: fffff70001080000

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030ba300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3078

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5728

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 1093

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10067

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2022-07-07T18:53:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.26022


FILE_IN_CAB:  041623-28095-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41284

BUGCHECK_P2: 350c3001

BUGCHECK_P3: 21b3c

BUGCHECK_P4: fffff70001080000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RobloxPlayerBe

STACK_TEXT: 
fffff880`09d16208 fffff800`02e97602     : 00000000`0000001a 00000000`00041284 00000000`350c3001 00000000`00021b3c : nt!KeBugCheckEx
fffff880`09d16210 fffff800`02e97343     : fffffa80`03f60638 00000000`350c2000 00000000`2a504000 fffffa80`03f602a0 : nt!MiLocateWsle+0x1e2
fffff880`09d16250 fffff800`02f8e1cd     : b3c00001`219dd867 ffffffff`ffffffff 00000000`00000200 fffffa80`03f602a0 : nt!MiTerminateWsle+0x23
fffff880`09d16280 fffff800`02e4d2cb     : 00000000`00000040 fffff680`001a8690 fffffa80`03f602a0 fffff800`00000000 : nt!MiDecommitPages+0x24d
fffff880`09d16b30 fffff800`02ebee53     : ffffffff`ffffffff fffffa80`046af750 00000000`097de508 00000000`00004000 : nt!NtFreeVirtualMemory+0xe6b
fffff880`09d16c20 00000000`77718eba     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`097de4d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77718eba


SYMBOL_NAME:  nt!MiLocateWsle+1e2

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.26022

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x1a_41284_nt!MiLocateWsle+1e2

OS_VERSION:  7.1.7601.26022

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {a5a082b3-d670-dbcc-a22f-4004d5609cec}

Followup:     MachineOwner
---------

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80022c5690
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800030b0300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13107

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 796

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3662

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2022-07-07T18:53:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.26022


FILE_IN_CAB:  041723-22370-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80022c5690

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffff880`0583c7a8 fffff800`02f676bd     : 00000000`0000001a 00000000`00041790 fffffa80`022c5690 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0583c7b0 fffff800`02e43d0f     : ffffffff`00000000 000000ce`ffffffff 00000000`00000000 00000000`00000200 : nt!MiDeleteVirtualAddresses+0x93d
fffff880`0583c920 fffff800`0323e584     : fffff8a0`090409d0 fffff880`0583cc20 fffff880`0583cc20 00000000`00000000 : nt!MmCleanProcessAddressSpace+0x3ff
fffff880`0583c970 fffff800`030d3e09     : fffffa80`80000003 00000000`80000001 000007ff`fffd3000 fffffa80`046deb50 : nt!PspExitThread+0x944
fffff880`0583ca30 fffff800`02e3d6c4     : 00000000`00000000 00000000`00000001 fffff880`02f686c0 fffff800`02e51aad : nt!PsExitSpecialApc+0x1d
fffff880`0583ca60 fffff800`02eab8e0     : 00000000`00007d00 fffff880`0583cae0 fffff800`031196a8 00000000`00000001 : nt!KiDeliverApc+0x2e4
fffff880`0583cae0 fffff800`02eb4ef7     : fffffa80`068dab50 00000000`00007d00 fffff880`0583cbf8 fffffa80`045a6a10 : nt!KiInitiateUserApc+0x70
fffff880`0583cc20 00000000`76f28d1a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`05aff508 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f28d1a


SYMBOL_NAME:  nt!MiDeleteVirtualAddresses+93d

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.26022

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeleteVirtualAddresses+93d

OS_VERSION:  7.1.7601.26022

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {c07e1216-fd41-b07c-d281-15399c0c2ddd}

Followup:     MachineOwner
---------

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa80022c5690
Arg3: 000000000000ffff
Arg4: 0000000000000000

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800028a2300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3249

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4797

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 781

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3571

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2022-07-07T18:53:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.26022


FILE_IN_CAB:  041323-23712-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffa80022c5690

BUGCHECK_P3: ffff

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffff880`060867a8 fffff800`027596bd     : 00000000`0000001a 00000000`00041790 fffffa80`022c5690 00000000`0000ffff : nt!KeBugCheckEx
fffff880`060867b0 fffff800`02635d0f     : ffffffff`00000000 0000016f`ffffffff 00000000`00000000 00000000`00000200 : nt!MiDeleteVirtualAddresses+0x93d
fffff880`06086920 fffff800`02a30584     : fffff8a0`007ad5e0 fffff880`06086c20 fffff880`06086c20 00000000`00000000 : nt!MmCleanProcessAddressSpace+0x3ff
fffff880`06086970 fffff800`028c5e09     : fffffa80`80000003 00000000`80000001 000007ff`fffa4000 fffffa80`044ecb50 : nt!PspExitThread+0x944
fffff880`06086a30 fffff800`0262f6c4     : 00000000`00000000 00000000`00000001 fffffa80`043b36c0 fffff800`02643aad : nt!PsExitSpecialApc+0x1d
fffff880`06086a60 fffff800`0269d8e0     : 00000000`ffffffff fffff880`06086ae0 fffff800`0290b6a8 00000000`00000001 : nt!KiDeliverApc+0x2e4
fffff880`06086ae0 fffff800`026a6ef7     : fffffa80`043b36c0 00000000`ffffffff 00000000`00000000 fffffa80`055f8230 : nt!KiInitiateUserApc+0x70
fffff880`06086c20 00000000`77bd8d1a     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`089df4d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bd8d1a


SYMBOL_NAME:  nt!MiDeleteVirtualAddresses+93d

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.26022

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeleteVirtualAddresses+93d

OS_VERSION:  7.1.7601.26022

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {c07e1216-fd41-b07c-d281-15399c0c2ddd}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı