1) BIOS'unuzu güncelleyin.
2) CMD'yi yönetici olarak açıp
sfc /scannow
yazın ve sonucun ekran alıntısını bizimle paylaşın.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the BugCheck
Arg2: fffff8050c876eb2, Address of the instruction which caused the BugCheck
Arg3: ffffcc817a8ee4c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11515
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 24050
Key : Analysis.Init.CPU.mSec
Value: 952
Key : Analysis.Init.Elapsed.mSec
Value: 2755
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff8050c876eb2
BUGCHECK_P3: ffffcc817a8ee4c0
BUGCHECK_P4: 0
CONTEXT: ffffcc817a8ee4c0 -- (.cxr 0xffffcc817a8ee4c0)
rax=0000000000000000 rbx=ffffcc817a8eef38 rcx=0000000000000007
rdx=00000000037762b0 rsi=ffff8f8d5bf4f000 rdi=ffff8f8d5bf4f000
rip=fffff8050c876eb2 rsp=ffffcc817a8eeec8 rbp=ffffcc817a8eef89
r8=000000000000001c r9=ffffba04ad61b0c0 r10=0000013711c472b0
r11=00000000000002b0 r12=ffff8f8d68b1fcb0 r13=ffffcc817a8ef150
r14=00000000c0000034 r15=000001370ed87b0c
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff805`0c876eb2 418b02 mov eax,dword ptr [r10] ds:002b:00000137`11c472b0=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffcc81`7a8eeec8 fffff805`0c7ec5a9 : 00000000`26f1ef26 00000000`85143a13 ffff8f8d`00000000 00000000`00000001 : nt!HvpGetCellPaged+0xa2
ffffcc81`7a8eeed0 fffff805`0c7efa19 : ffff8f8d`68b1fcb0 00000000`00000003 ffffcc81`7a8ef0d0 ffffcc81`7a8ef130 : nt!CmpWalkOneLevel+0x4a9
ffffcc81`7a8eefd0 fffff805`0c7ee303 : 00000000`0000001c ffffcc81`7a8ef320 ffffcc81`7a8ef2d8 ffffba04`ad2846e0 : nt!CmpDoParseKey+0x849
ffffcc81`7a8ef270 fffff805`0c7f23ce : fffff805`0c7ee001 00000000`00000000 ffffba04`ad2846e0 0a000003`d9358001 : nt!CmpParseKey+0x2c3
ffffcc81`7a8ef410 fffff805`0c9014aa : ffffba04`ad284600 ffffcc81`7a8ef678 00000000`00000040 ffffba04`9ed3c7a0 : nt!ObpLookupObjectName+0x3fe
ffffcc81`7a8ef5e0 fffff805`0c90128c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffba04`9ed3c7a0 : nt!ObOpenObjectByNameEx+0x1fa
ffffcc81`7a8ef710 fffff805`0c900db1 : 000000ea`06bface8 ffffcc81`7a8efa80 00000000`00000001 fffff805`0c40827e : nt!ObOpenObjectByName+0x5c
ffffcc81`7a8ef760 fffff805`0c900adf : 00000000`00000002 00007ff9`6c567f30 00000000`00000000 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffcc81`7a8ef9c0 fffff805`0c6085b5 : 00007ff9`a020c548 00000000`00000010 ffffcc81`7a8efa80 000000ea`06bfc1c0 : nt!NtOpenKeyEx+0xf
ffffcc81`7a8efa00 00007ff9`e238f214 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ea`06bfac08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e238f214
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1081
STACK_COMMAND: .cxr 0xffffcc817a8ee4c0 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------[/CODE]