Cesare Sergio
Nuovo Utente
- Messaggi
- 1
- Reazioni
- 0
- Punteggio
- 24
Salve, ultimamente ho frequenti schermate blu
Ecco le specifiche del computer:
Intel Core i5-2500K 3.3Ghz 6MB 1155 Sandy Bridge Unlocked con GPU 95W BOXhttp://www.prokoo.com/return_produc...=6638&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8Asus P8P67 REV 3.0 - New P67 B3 Revision DIGI+ VRM
DDR3 1600Mhz PC12800 4GB G. Skill Trident 4GBTD CL8 Skt1156 (2x2GB)http://www.prokoo.com/return_produc...=3048&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8Corsair Gaming Series CMPSU-800GEU 800Whttp://www.prokoo.com/return_produc...14648&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8GF GTX560 Ti GIGABYTE 1GB OC 2xDVI/mHDMIhttp://www.prokoo.com/return_produc...=8066&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8OCZ SSD Agility 3 60GB 2.5" SATA3 rt
Allego i vari file di dump:
Poi, oggi, mentre ero in gioco è verificato un altro errore 0xA, successivamente ho riavviato e mentre ero su internet si è freezata la schermata del monitor con beep in sottofondo.
Dopo due riavvii, il computer prima si accendeva e poi si riavviava automaticamente senza che apparisse alcuna scritta sul monitor, poi è apparsa una schermata "American Megatrends" che riportava un "overclocking failed".
Ho eseguito mdsched.exe per 5-6 ore senza risultato e memtool 3-4 volte per un paio di ore senza problematiche.
Ho eseguito anche il controllo del processore mediante apposito Intel tool.
Qualcuno che può aiutarmi? XD
Ecco le specifiche del computer:
Intel Core i5-2500K 3.3Ghz 6MB 1155 Sandy Bridge Unlocked con GPU 95W BOXhttp://www.prokoo.com/return_produc...=6638&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8Asus P8P67 REV 3.0 - New P67 B3 Revision DIGI+ VRM
DDR3 1600Mhz PC12800 4GB G. Skill Trident 4GBTD CL8 Skt1156 (2x2GB)http://www.prokoo.com/return_produc...=3048&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8Corsair Gaming Series CMPSU-800GEU 800Whttp://www.prokoo.com/return_produc...14648&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8GF GTX560 Ti GIGABYTE 1GB OC 2xDVI/mHDMIhttp://www.prokoo.com/return_produc...=8066&osCsid=04b5bc0851aa2e3cae0f4e04f98216b8OCZ SSD Agility 3 60GB 2.5" SATA3 rt
Allego i vari file di dump:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000d8000d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030cedd4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fa100
0000000000d8000d
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopfCompleteRequest+754
fffff800`030cedd4 488b4008 mov rax,qword ptr [rax+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c480 -- (.trap 0xfffff80000b9c480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000d80005 rbx=fffff80000b9c830 rcx=fffffa800393e600
rdx=0000000000000000 rsi=fffffa800023ae4d rdi=fffff88002f35f76
rip=fffff800030cedd4 rsp=fffff80000b9c610 rbp=00000000a000000c
r8=000000000000000f r9=0000000000000000 r10=fffffa80064d8910
r11=fffff80000b9c6f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!IopfCompleteRequest+0x754:
fffff800`030cedd4 488b4008 mov rax,qword ptr [rax+8] ds:00000000`00d8000d=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030ca569 to fffff800030cafc0
STACK_TEXT:
fffff800`00b9c338 fffff800`030ca569 : 00000000`0000000a 00000000`00d8000d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c340 fffff800`030c91e0 : fffffa80`04471060 00000000`00000002 fffff800`00b9c4c8 fffffa80`04dd5593 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c480 fffff800`030cedd4 : 00000000`00000000 00000000`00000000 fffff800`00b9c6b0 fffff880`0f2f87c9 : nt!KiPageFault+0x260
fffff800`00b9c610 fffff880`045b5025 : fffffa80`05f6c010 fffff880`02f38300 fffffa80`06184ec0 00000000`00000000 : nt!IopfCompleteRequest+0x754
fffff800`00b9c700 fffff880`045b35cc : fffffa80`05846b00 fffffa80`03bdc010 00000000`00000000 fffffa80`04dd50e0 : ks!CKsPin::TransferKsIrp+0xf5
fffff800`00b9c740 fffff880`045b471f : fffffa80`05f6c7a0 00000000`00000000 00000000`00000000 00000000`00000001 : ks!KspTransferKsIrp+0x54
fffff800`00b9c770 fffff880`045b47af : fffffa80`03bdc010 00000000`00000002 00000000`00000000 fffffa80`06be8302 : ks!CKsQueue::ForwardIrp+0x167
fffff800`00b9c7c0 fffff880`045b517f : fffffa80`03bdc010 00000000`00000000 fffffa80`04dd50e0 fffffa80`057bf610 : ks!CKsQueue::ForwardWaitingIrps+0x5f
fffff800`00b9c7f0 fffff880`045b4945 : fffffa80`057bf610 00000000`00000000 fffffa80`057bf670 00000000`00000000 : ks!CKsQueue::UnlockStreamPointer+0x123
fffff800`00b9c840 fffff880`05d50061 : fffffa80`03ccfc30 fffffa80`057bf670 00000000`00000000 fffffa80`03ccfc30 : ks!CKsQueue::DeleteStreamPointer+0xf5
fffff800`00b9c880 fffff800`030ce9c1 : fffffa80`03c65fbb 00000000`00000000 00000000`00000000 00000000`00000050 : usbaudio!USBType1CompleteCallback+0x20d
fffff800`00b9c8f0 fffff880`0ff42631 : fffffa80`04ca0050 fffffa80`06be8300 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff800`00b9c9e0 fffff880`0ff42b0f : fffffa80`044d7902 fffffa80`03c65b40 00000000`ffffffff fffffa80`04ca0eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff800`00b9cac0 fffff880`0ff4066f : fffffa80`04ca0eb0 fffffa80`04ca01a0 fffffa80`04ca1050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff800`00b9cb20 fffff880`0ff31f89 : fffffa80`04ca0050 00000000`00000000 fffffa80`04ca0e02 fffffa80`04ca0eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff800`00b9cb60 fffff800`030d56ec : fffff800`0323de80 fffffa80`04ca0eb0 fffffa80`04ca0ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9cb90 fffff800`030c2cca : fffff800`0323de80 fffff800`0324bcc0 00000000`00000000 fffff880`0ff31db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cc40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cc00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff800030ce1a2 - nt!SwapContext_PatchXSave+2
[ 01:21 ]
fffff800030ce286 - nt!SwapContext_PatchXRstor+2 (+0xe4)
[ 09:29 ]
fffff800030ce442 - nt!EnlightenedSwapContext_PatchXSave+2 (+0x1bc)
[ 01:21 ]
fffff800030ce528 - nt!EnlightenedSwapContext_PatchXRstor+2 (+0xe6)
[ 09:29 ]
4 errors : !nt (fffff800030ce1a2-fffff800030ce528)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT_LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88007438040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.
FAULTING_IP:
+0
00000000`00000000 ?? ???
CONTEXT: fffff88007438040 -- (.cxr 0xfffff88007438040)
rax=00000000c00000f2 rbx=0000000000000000 rcx=fffffa8007088f00
rdx=000000001413e7f4 rsi=0000000000000001 rdi=fffffa80037c23f0
rip=0000000000000000 rsp=fffff88007438a28 rbp=fffff88007438b60
r8=0000000000000025 r9=0000000000000072 r10=0000000080001c80
r11=0000000000000000 r12=fffff88007438ab8 r13=000000007ef92001
r14=fffff88007438b60 r15=fffff8a00824e6d0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
00000000`00000000 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: iw3mp.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 80001c8000000000 to 0000000000000000
STACK_TEXT:
fffff880`07438a28 80001c80`00000000 : 00000000`00060000 00000000`00000000 00000000`14ab0000 00000000`00000014 : 0x0
fffff880`07438a30 00000000`00060000 : 00000000`00000000 00000000`14ab0000 00000000`00000014 bf49085c`bef9f01e : 0x80001c80`00000000
fffff880`07438a38 00000000`00000000 : 00000000`14ab0000 00000000`00000014 bf49085c`bef9f01e 00000000`00000000 : 0x60000
fffff880`07438a40 00000000`14ab0000 : 00000000`00000014 bf49085c`bef9f01e 00000000`00000000 00000000`0000000d : 0x0
fffff880`07438a48 00000000`00000014 : bf49085c`bef9f01e 00000000`00000000 00000000`0000000d fffffa80`0708e000 : 0x14ab0000
fffff880`07438a50 bf49085c`bef9f01e : 00000000`00000000 00000000`0000000d fffffa80`0708e000 00000000`00000000 : 0x14
fffff880`07438a58 00000000`00000000 : 00000000`0000000d fffffa80`0708e000 00000000`00000000 fffff8a0`007fc000 : 0xbf49085c`bef9f01e
fffff880`07438a60 00000000`0000000d : fffffa80`0708e000 00000000`00000000 fffff8a0`007fc000 fffffa80`0708e000 : 0x0
fffff880`07438a68 fffffa80`0708e000 : 00000000`00000000 fffff8a0`007fc000 fffffa80`0708e000 00000000`00000000 : 0xd
fffff880`07438a70 00000000`00000000 : fffff8a0`007fc000 fffffa80`0708e000 00000000`00000000 00000000`7482679c : 0xfffffa80`0708e000
fffff880`07438a78 fffff8a0`007fc000 : fffffa80`0708e000 00000000`00000000 00000000`7482679c 00000000`00000020 : 0x0
fffff880`07438a80 fffffa80`0708e000 : 00000000`00000000 00000000`7482679c 00000000`00000020 fffffa80`0605f7a0 : 0xfffff8a0`007fc000
fffff880`07438a88 00000000`00000000 : 00000000`7482679c 00000000`00000020 fffffa80`0605f7a0 fffff960`002105c2 : 0xfffffa80`0708e000
fffff880`07438a90 00000000`7482679c : 00000000`00000020 fffffa80`0605f7a0 fffff960`002105c2 00000000`1413e7f0 : 0x0
fffff880`07438a98 00000000`00000020 : fffffa80`0605f7a0 fffff960`002105c2 00000000`1413e7f0 00000000`00000000 : 0x7482679c
fffff880`07438aa0 fffffa80`0605f7a0 : fffff960`002105c2 00000000`1413e7f0 00000000`00000000 00000000`000007db : 0x20
fffff880`07438aa8 fffff960`002105c2 : 00000000`1413e7f0 00000000`00000000 00000000`000007db fffff8a0`007fc000 : 0xfffffa80`0605f7a0
fffff880`07438ab0 fffff800`030cb253 : fffffa80`0605f7a0 00000000`000003d8 fffff880`00000000 fffffa80`03b242c0 : win32k!NtGdiDdDDILock+0x12
fffff880`07438ae0 00000000`7484156a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1413e7c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7484156a
FOLLOWUP_IP:
win32k!NtGdiDdDDILock+12
fffff960`002105c2 eb05 jmp win32k!NtGdiDdDDILock+0x19 (fffff960`002105c9)
SYMBOL_STACK_INDEX: 11
SYMBOL_NAME: win32k!NtGdiDdDDILock+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5080499a
STACK_COMMAND: .cxr 0xfffff88007438040 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!NtGdiDdDDILock+12
BUCKET_ID: X64_0x3B_win32k!NtGdiDdDDILock+12
Followup: MachineOwner
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000d8000d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030cedd4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fa100
0000000000d8000d
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopfCompleteRequest+754
fffff800`030cedd4 488b4008 mov rax,qword ptr [rax+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c480 -- (.trap 0xfffff80000b9c480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000d80005 rbx=fffff80000b9c830 rcx=fffffa800393e600
rdx=0000000000000000 rsi=fffffa800023ae4d rdi=fffff88002f35f76
rip=fffff800030cedd4 rsp=fffff80000b9c610 rbp=00000000a000000c
r8=000000000000000f r9=0000000000000000 r10=fffffa80064d8910
r11=fffff80000b9c6f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!IopfCompleteRequest+0x754:
fffff800`030cedd4 488b4008 mov rax,qword ptr [rax+8] ds:00000000`00d8000d=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030ca569 to fffff800030cafc0
STACK_TEXT:
fffff800`00b9c338 fffff800`030ca569 : 00000000`0000000a 00000000`00d8000d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c340 fffff800`030c91e0 : fffffa80`04471060 00000000`00000002 fffff800`00b9c4c8 fffffa80`04dd5593 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c480 fffff800`030cedd4 : 00000000`00000000 00000000`00000000 fffff800`00b9c6b0 fffff880`0f2f87c9 : nt!KiPageFault+0x260
fffff800`00b9c610 fffff880`045b5025 : fffffa80`05f6c010 fffff880`02f38300 fffffa80`06184ec0 00000000`00000000 : nt!IopfCompleteRequest+0x754
fffff800`00b9c700 fffff880`045b35cc : fffffa80`05846b00 fffffa80`03bdc010 00000000`00000000 fffffa80`04dd50e0 : ks!CKsPin::TransferKsIrp+0xf5
fffff800`00b9c740 fffff880`045b471f : fffffa80`05f6c7a0 00000000`00000000 00000000`00000000 00000000`00000001 : ks!KspTransferKsIrp+0x54
fffff800`00b9c770 fffff880`045b47af : fffffa80`03bdc010 00000000`00000002 00000000`00000000 fffffa80`06be8302 : ks!CKsQueue::ForwardIrp+0x167
fffff800`00b9c7c0 fffff880`045b517f : fffffa80`03bdc010 00000000`00000000 fffffa80`04dd50e0 fffffa80`057bf610 : ks!CKsQueue::ForwardWaitingIrps+0x5f
fffff800`00b9c7f0 fffff880`045b4945 : fffffa80`057bf610 00000000`00000000 fffffa80`057bf670 00000000`00000000 : ks!CKsQueue::UnlockStreamPointer+0x123
fffff800`00b9c840 fffff880`05d50061 : fffffa80`03ccfc30 fffffa80`057bf670 00000000`00000000 fffffa80`03ccfc30 : ks!CKsQueue::DeleteStreamPointer+0xf5
fffff800`00b9c880 fffff800`030ce9c1 : fffffa80`03c65fbb 00000000`00000000 00000000`00000000 00000000`00000050 : usbaudio!USBType1CompleteCallback+0x20d
fffff800`00b9c8f0 fffff880`0ff42631 : fffffa80`04ca0050 fffffa80`06be8300 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff800`00b9c9e0 fffff880`0ff42b0f : fffffa80`044d7902 fffffa80`03c65b40 00000000`ffffffff fffffa80`04ca0eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff800`00b9cac0 fffff880`0ff4066f : fffffa80`04ca0eb0 fffffa80`04ca01a0 fffffa80`04ca1050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff800`00b9cb20 fffff880`0ff31f89 : fffffa80`04ca0050 00000000`00000000 fffffa80`04ca0e02 fffffa80`04ca0eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff800`00b9cb60 fffff800`030d56ec : fffff800`0323de80 fffffa80`04ca0eb0 fffffa80`04ca0ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9cb90 fffff800`030c2cca : fffff800`0323de80 fffff800`0324bcc0 00000000`00000000 fffff880`0ff31db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cc40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cc00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff800030ce1a2 - nt!SwapContext_PatchXSave+2
[ 01:21 ]
fffff800030ce286 - nt!SwapContext_PatchXRstor+2 (+0xe4)
[ 09:29 ]
fffff800030ce442 - nt!EnlightenedSwapContext_PatchXSave+2 (+0x1bc)
[ 01:21 ]
fffff800030ce528 - nt!EnlightenedSwapContext_PatchXRstor+2 (+0xe6)
[ 09:29 ]
4 errors : !nt (fffff800030ce1a2-fffff800030ce528)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT_LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT_LARGE
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88007438040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%08lx ha fatto riferimento alla memoria a 0x%08lx. La memoria non poteva essere %s.
FAULTING_IP:
+0
00000000`00000000 ?? ???
CONTEXT: fffff88007438040 -- (.cxr 0xfffff88007438040)
rax=00000000c00000f2 rbx=0000000000000000 rcx=fffffa8007088f00
rdx=000000001413e7f4 rsi=0000000000000001 rdi=fffffa80037c23f0
rip=0000000000000000 rsp=fffff88007438a28 rbp=fffff88007438b60
r8=0000000000000025 r9=0000000000000072 r10=0000000080001c80
r11=0000000000000000 r12=fffff88007438ab8 r13=000000007ef92001
r14=fffff88007438b60 r15=fffff8a00824e6d0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
00000000`00000000 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: iw3mp.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 80001c8000000000 to 0000000000000000
STACK_TEXT:
fffff880`07438a28 80001c80`00000000 : 00000000`00060000 00000000`00000000 00000000`14ab0000 00000000`00000014 : 0x0
fffff880`07438a30 00000000`00060000 : 00000000`00000000 00000000`14ab0000 00000000`00000014 bf49085c`bef9f01e : 0x80001c80`00000000
fffff880`07438a38 00000000`00000000 : 00000000`14ab0000 00000000`00000014 bf49085c`bef9f01e 00000000`00000000 : 0x60000
fffff880`07438a40 00000000`14ab0000 : 00000000`00000014 bf49085c`bef9f01e 00000000`00000000 00000000`0000000d : 0x0
fffff880`07438a48 00000000`00000014 : bf49085c`bef9f01e 00000000`00000000 00000000`0000000d fffffa80`0708e000 : 0x14ab0000
fffff880`07438a50 bf49085c`bef9f01e : 00000000`00000000 00000000`0000000d fffffa80`0708e000 00000000`00000000 : 0x14
fffff880`07438a58 00000000`00000000 : 00000000`0000000d fffffa80`0708e000 00000000`00000000 fffff8a0`007fc000 : 0xbf49085c`bef9f01e
fffff880`07438a60 00000000`0000000d : fffffa80`0708e000 00000000`00000000 fffff8a0`007fc000 fffffa80`0708e000 : 0x0
fffff880`07438a68 fffffa80`0708e000 : 00000000`00000000 fffff8a0`007fc000 fffffa80`0708e000 00000000`00000000 : 0xd
fffff880`07438a70 00000000`00000000 : fffff8a0`007fc000 fffffa80`0708e000 00000000`00000000 00000000`7482679c : 0xfffffa80`0708e000
fffff880`07438a78 fffff8a0`007fc000 : fffffa80`0708e000 00000000`00000000 00000000`7482679c 00000000`00000020 : 0x0
fffff880`07438a80 fffffa80`0708e000 : 00000000`00000000 00000000`7482679c 00000000`00000020 fffffa80`0605f7a0 : 0xfffff8a0`007fc000
fffff880`07438a88 00000000`00000000 : 00000000`7482679c 00000000`00000020 fffffa80`0605f7a0 fffff960`002105c2 : 0xfffffa80`0708e000
fffff880`07438a90 00000000`7482679c : 00000000`00000020 fffffa80`0605f7a0 fffff960`002105c2 00000000`1413e7f0 : 0x0
fffff880`07438a98 00000000`00000020 : fffffa80`0605f7a0 fffff960`002105c2 00000000`1413e7f0 00000000`00000000 : 0x7482679c
fffff880`07438aa0 fffffa80`0605f7a0 : fffff960`002105c2 00000000`1413e7f0 00000000`00000000 00000000`000007db : 0x20
fffff880`07438aa8 fffff960`002105c2 : 00000000`1413e7f0 00000000`00000000 00000000`000007db fffff8a0`007fc000 : 0xfffffa80`0605f7a0
fffff880`07438ab0 fffff800`030cb253 : fffffa80`0605f7a0 00000000`000003d8 fffff880`00000000 fffffa80`03b242c0 : win32k!NtGdiDdDDILock+0x12
fffff880`07438ae0 00000000`7484156a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1413e7c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7484156a
FOLLOWUP_IP:
win32k!NtGdiDdDDILock+12
fffff960`002105c2 eb05 jmp win32k!NtGdiDdDDILock+0x19 (fffff960`002105c9)
SYMBOL_STACK_INDEX: 11
SYMBOL_NAME: win32k!NtGdiDdDDILock+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5080499a
STACK_COMMAND: .cxr 0xfffff88007438040 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!NtGdiDdDDILock+12
BUCKET_ID: X64_0x3B_win32k!NtGdiDdDDILock+12
Followup: MachineOwner
Poi, oggi, mentre ero in gioco è verificato un altro errore 0xA, successivamente ho riavviato e mentre ero su internet si è freezata la schermata del monitor con beep in sottofondo.
Dopo due riavvii, il computer prima si accendeva e poi si riavviava automaticamente senza che apparisse alcuna scritta sul monitor, poi è apparsa una schermata "American Megatrends" che riportava un "overclocking failed".
Ho eseguito mdsched.exe per 5-6 ore senza risultato e memtool 3-4 volte per un paio di ore senza problematiche.
Ho eseguito anche il controllo del processore mediante apposito Intel tool.
Qualcuno che può aiutarmi? XD