Yeşil ekran hatası

İşletim sistemi
Windows 10

Daylight Art

Hectopat
Katılım
13 Ekim 2020
Mesajlar
1.165
Çözümler
3
Daha fazla  
Cinsiyet
Erkek
Selamlar bilgisayarı başlattığımda yeşil ekran hatası aldım. Windows Insider ile ilgili bir şeyler yazıyordu. Bir ara Insider programını katıldım sonrasında hatalar olmaya başladı kurtarma sekmesinden geri yükleme yaptım. Sonrasında bu yeşil ekran hatasını almaya başladım. Minidump dosyasını yüklüyorum. Yardımcı olabilirseniz sevinirim.
Minidump
 
1) BIOS'unuzu güncelleyin.

2) CMD'yi yönetici olarak açıp sfc /scannow yazın ve sonucun ekran alıntısını bizimle paylaşın.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the BugCheck
Arg2: fffff8050c876eb2, Address of the instruction which caused the BugCheck
Arg3: ffffcc817a8ee4c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 11515

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 24050

Key : Analysis.Init.CPU.mSec
Value: 952

Key : Analysis.Init.Elapsed.mSec
Value: 2755

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff8050c876eb2

BUGCHECK_P3: ffffcc817a8ee4c0

BUGCHECK_P4: 0

CONTEXT: ffffcc817a8ee4c0 -- (.cxr 0xffffcc817a8ee4c0)
rax=0000000000000000 rbx=ffffcc817a8eef38 rcx=0000000000000007
rdx=00000000037762b0 rsi=ffff8f8d5bf4f000 rdi=ffff8f8d5bf4f000
rip=fffff8050c876eb2 rsp=ffffcc817a8eeec8 rbp=ffffcc817a8eef89
r8=000000000000001c r9=ffffba04ad61b0c0 r10=0000013711c472b0
r11=00000000000002b0 r12=ffff8f8d68b1fcb0 r13=ffffcc817a8ef150
r14=00000000c0000034 r15=000001370ed87b0c
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff805`0c876eb2 418b02 mov eax,dword ptr [r10] ds:002b:00000137`11c472b0=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Registry

STACK_TEXT:
ffffcc81`7a8eeec8 fffff805`0c7ec5a9 : 00000000`26f1ef26 00000000`85143a13 ffff8f8d`00000000 00000000`00000001 : nt!HvpGetCellPaged+0xa2
ffffcc81`7a8eeed0 fffff805`0c7efa19 : ffff8f8d`68b1fcb0 00000000`00000003 ffffcc81`7a8ef0d0 ffffcc81`7a8ef130 : nt!CmpWalkOneLevel+0x4a9
ffffcc81`7a8eefd0 fffff805`0c7ee303 : 00000000`0000001c ffffcc81`7a8ef320 ffffcc81`7a8ef2d8 ffffba04`ad2846e0 : nt!CmpDoParseKey+0x849
ffffcc81`7a8ef270 fffff805`0c7f23ce : fffff805`0c7ee001 00000000`00000000 ffffba04`ad2846e0 0a000003`d9358001 : nt!CmpParseKey+0x2c3
ffffcc81`7a8ef410 fffff805`0c9014aa : ffffba04`ad284600 ffffcc81`7a8ef678 00000000`00000040 ffffba04`9ed3c7a0 : nt!ObpLookupObjectName+0x3fe
ffffcc81`7a8ef5e0 fffff805`0c90128c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffba04`9ed3c7a0 : nt!ObOpenObjectByNameEx+0x1fa
ffffcc81`7a8ef710 fffff805`0c900db1 : 000000ea`06bface8 ffffcc81`7a8efa80 00000000`00000001 fffff805`0c40827e : nt!ObOpenObjectByName+0x5c
ffffcc81`7a8ef760 fffff805`0c900adf : 00000000`00000002 00007ff9`6c567f30 00000000`00000000 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffcc81`7a8ef9c0 fffff805`0c6085b5 : 00007ff9`a020c548 00000000`00000010 ffffcc81`7a8efa80 000000ea`06bfc1c0 : nt!NtOpenKeyEx+0xf
ffffcc81`7a8efa00 00007ff9`e238f214 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ea`06bfac08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e238f214


SYMBOL_NAME: nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1081

STACK_COMMAND: .cxr 0xffffcc817a8ee4c0 ; kb

BUCKET_ID_FUNC_OFFSET: a2

FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup: MachineOwner
---------[/CODE]
 

Yeni konular

Geri
Yukarı