BSoD all'avvio con frequenza giornaliera.

Notebook acquistato il 25/09/23
presenta continuamente errori BSoD all'avvio di tipo KERNEL_SECURITY_CHECK_FAILURE (139) e MEMORY_MANAGEMENT (1a), con frequenza giornaliera.

ipotizzando un problema di driver,
ho tentato di ripristinare windows 11 con il supporto usb fornito ma il ripristino non ha risolto il problema.
può essere un difetto di uno stick della RAM o del drive M.2?

qualcuno ha avuto esperienze nel ricevere assistenza in casi simili?

******************************************************************************************
Elimina Pro Series: Widescreen 240 Hz sRGB 100 % LED opaco QHD 16" (2560 x 1600)
Processore (CPU)
Processore Intel® Core™ i7 14 Core 13700H (5.0 GHz Turbo)
Memoria (RAM)
DDR4 SODIMM Corsair 3200 MHz 64 GB (2 da 32 GB)
Scheda grafica
NVIDIA® GeForce® RTX 4070 - 8.0 GB GDDR6 Video RAM - DirectX® 12.1
1o drive SSD M.2
SAMSUNG 980 PRO M.2 2 TB NVMe PCIe (fino a 7000 MB/R, 5000 MB/W)
Lettore di schede di memoria
Lettore di schede 3 in 1 integrato (SDHC/SDXC/SD full size)

Adattatore 230W AC
cavo di alimentazione europeo 1,5 metro (tipo C13)

Batteria
Batteria agli ioni di litio integrata (62 Wh) - Serie Elimina Pro
Pasta termica
PRESTAZIONI DI RAFFREDDAMENTO A METALLO LIQUIDO
Scheda audio
Nahimic di SteelSeries Audio HD a 2 canali
Bluetooth e wireless
LAN GIGABIT E WIRELESS IINTEL® KILLER™ Wi-Fi 6E AX1675i + BT 5.3
Opzioni USB/Thunderbolt
1 PORTA USB 3.2 (tipo C) + 2 PORTE USB 3.2 + 1 PORTA USB 2.0
Lingua tastiera
TASTIERA ITALIANA RETROILLUMINATA MULTICOLORE SERIE ELIMINA 16"
Sistema operativo
Windows 11 Professional 64-bit – incl. licenza singola

Lingua del sistema operativo
Italia/Italia – Lingua italiana
Supporto di ripristino Windows
Immagine di ripristino multilingue di Windows 11 - Fornita su unità USB
Software Office
Prova GRATUITA 30 giorni di Microsoft 365® (richiesto sistema operativo)
Antivirus
NESSUN SOFTWARE ANTIVIRUS
Browser
Google Chrome™
Mouse per Notebook
MOUSE TOUCHPAD 2 PULSANTI INTEGRATO
Webcam
WEBCAM HD 1 MP INTEGRATA
Garanzia
Garanzia Oro 3 anni (2 anni Ritiro e spedizione, 2 anni Ricambi, 3 anni Manodopera)
Garanzia dead pixel
Garanzia dead pixel 1 anno inclusi costi di manodopera e trasporto
*****************************************************************************************************
 
minidump relativo all'ultimo errore, a meno di 24h dal ripristino
18: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc706b442f290, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffc706b442f1e8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 406

Key : Analysis.Elapsed.mSec
Value: 7612

Key : Analysis.IO.Other.Mb
Value: 1

Key : Analysis.IO.Read.Mb
Value: 12

Key : Analysis.IO.Write.Mb
Value: 36

Key : Analysis.Init.CPU.mSec
Value: 124

Key : Analysis.Init.Elapsed.mSec
Value: 17841

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Bugcheck.Code.LegacyAPI
Value: 0x139

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

Key : Failure.Hash
Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 1

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1

Key : Hypervisor.Flags.Phase0InitDone
Value: 1

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 1

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 21631230

Key : Hypervisor.Flags.ValueHex
Value: 14a10fe

Key : Hypervisor.Flags.VpAssistPage
Value: 1

Key : Hypervisor.Flags.VsmAvailable
Value: 1

Key : Hypervisor.RootFlags.AccessStats
Value: 1

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 1

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1

Key : Hypervisor.RootFlags.MceEnlightened
Value: 1

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1

Key : Hypervisor.RootFlags.Value
Value: 1015

Key : Hypervisor.RootFlags.ValueHex
Value: 3f7

Key : WER.OS.Branch
Value: ni_release

Key : WER.OS.Version
Value: 10.0.22621.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc706b442f290

BUGCHECK_P3: ffffc706b442f1e8

BUGCHECK_P4: 0

FILE_IN_CAB: 022924-10765-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b


TRAP_FRAME: ffffc706b442f290 -- (.trap 0xffffc706b442f290)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb04844d7968 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077d669c3b rsp=ffffc706b442f420 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffffc706b442f890 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiExitDispatcher+0x39b:
fffff807`7d669c3b cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffc706b442f1e8 -- (.exr 0xffffc706b442f1e8)
ExceptionAddress: fffff8077d669c3b (nt!KiExitDispatcher+0x000000000000039b)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Il sistema ha rilevato un sovraccarico di un buffer basato su stack in questa applicazione. Il sovraccarico potrebbe consentire a un utente non autorizzato di assumere il controllo dell'applicazione.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffc706`b442ef68 fffff807`7d82c5e9 : 00000000`00000139 00000000`00000003 ffffc706`b442f290 ffffc706`b442f1e8 : nt!KeBugCheckEx
ffffc706`b442ef70 fffff807`7d82cbb2 : ffffdb04`00000000 00000004`00000004 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffc706`b442f0b0 fffff807`7d82a906 : fffff807`7b59b180 fffff807`7e14b040 ffffdb04`8498d500 ffffdb04`8498d500 : nt!KiFastFailDispatch+0xb2
ffffc706`b442f290 fffff807`7d669c3b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffc706`b442f420 fffff807`7d7070cc : ffffdb04`85573500 ffffdb04`8498d788 ffffca80`bfc91180 fffff807`7d6d1872 : nt!KiExitDispatcher+0x39b
ffffc706`b442f7d0 fffff807`7db70520 : ffffdb04`8498d500 ffffdb04`85573500 ffffdb04`85573500 ffffdb04`7f40e040 : nt!KeRequestTerminationThread+0xd4
ffffc706`b442f8b0 fffff807`7db701c7 : 00000000`00000008 ffffdb04`85573500 00000000`00000000 00000000`00000000 : nt!PspTerminateThreadByPointer+0x80
ffffc706`b442f8f0 fffff807`7db21e1b : ffffdb04`84709040 00000000`00000000 ffffdb04`84947080 00000000`00000000 : nt!PspTerminateAllThreads+0xcb
ffffc706`b442f960 fffff807`7db21bf1 : ffffffff`ffffffff ffffdb04`7f0d50c0 ffffdb04`7f40e040 ffffdb04`84947080 : nt!PspTerminateProcess+0xe7
ffffc706`b442f9a0 fffff807`7d82bce5 : ffffdb04`00003840 ffffdb04`7f40e040 ffffdb04`84947080 ffffdb04`80c13270 : nt!NtTerminateProcess+0xb1
ffffc706`b442fa20 00007ff8`06faf8f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fe`d027f228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`06faf8f4


SYMBOL_NAME: nt!KiFastFailDispatch+b2

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.3155

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: b2

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------

18: kd> lmvm nt
Browse full module list
start end module name
fffff807`7d400000 fffff807`7e447000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\2A832A6884144D88C39DB4B4DB66D71C1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\6479E1C71047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 6479E1C7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00B876D8
ImageSize: 01047000
File version: 10.0.22621.3155
Product version: 10.0.22621.3155
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.22621.3155
FileVersion: 10.0.22621.3155 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
 

Ekans2011

VALUED CONTRIBUTOR
minidump relativo all'ultimo errore, a meno di 24h dal ripristino
18: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc706b442f290, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffc706b442f1e8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 406

Key : Analysis.Elapsed.mSec
Value: 7612

Key : Analysis.IO.Other.Mb
Value: 1

Key : Analysis.IO.Read.Mb
Value: 12

Key : Analysis.IO.Write.Mb
Value: 36

Key : Analysis.Init.CPU.mSec
Value: 124

Key : Analysis.Init.Elapsed.mSec
Value: 17841

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Bugcheck.Code.LegacyAPI
Value: 0x139

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

Key : Failure.Hash
Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 1

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1

Key : Hypervisor.Flags.Phase0InitDone
Value: 1

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 1

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 21631230

Key : Hypervisor.Flags.ValueHex
Value: 14a10fe

Key : Hypervisor.Flags.VpAssistPage
Value: 1

Key : Hypervisor.Flags.VsmAvailable
Value: 1

Key : Hypervisor.RootFlags.AccessStats
Value: 1

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 1

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1

Key : Hypervisor.RootFlags.MceEnlightened
Value: 1

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1

Key : Hypervisor.RootFlags.Value
Value: 1015

Key : Hypervisor.RootFlags.ValueHex
Value: 3f7

Key : WER.OS.Branch
Value: ni_release

Key : WER.OS.Version
Value: 10.0.22621.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc706b442f290

BUGCHECK_P3: ffffc706b442f1e8

BUGCHECK_P4: 0

FILE_IN_CAB: 022924-10765-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b


TRAP_FRAME: ffffc706b442f290 -- (.trap 0xffffc706b442f290)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb04844d7968 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077d669c3b rsp=ffffc706b442f420 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffffc706b442f890 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiExitDispatcher+0x39b:
fffff807`7d669c3b cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffc706b442f1e8 -- (.exr 0xffffc706b442f1e8)
ExceptionAddress: fffff8077d669c3b (nt!KiExitDispatcher+0x000000000000039b)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Il sistema ha rilevato un sovraccarico di un buffer basato su stack in questa applicazione. Il sovraccarico potrebbe consentire a un utente non autorizzato di assumere il controllo dell'applicazione.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffc706`b442ef68 fffff807`7d82c5e9 : 00000000`00000139 00000000`00000003 ffffc706`b442f290 ffffc706`b442f1e8 : nt!KeBugCheckEx
ffffc706`b442ef70 fffff807`7d82cbb2 : ffffdb04`00000000 00000004`00000004 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffc706`b442f0b0 fffff807`7d82a906 : fffff807`7b59b180 fffff807`7e14b040 ffffdb04`8498d500 ffffdb04`8498d500 : nt!KiFastFailDispatch+0xb2
ffffc706`b442f290 fffff807`7d669c3b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffc706`b442f420 fffff807`7d7070cc : ffffdb04`85573500 ffffdb04`8498d788 ffffca80`bfc91180 fffff807`7d6d1872 : nt!KiExitDispatcher+0x39b
ffffc706`b442f7d0 fffff807`7db70520 : ffffdb04`8498d500 ffffdb04`85573500 ffffdb04`85573500 ffffdb04`7f40e040 : nt!KeRequestTerminationThread+0xd4
ffffc706`b442f8b0 fffff807`7db701c7 : 00000000`00000008 ffffdb04`85573500 00000000`00000000 00000000`00000000 : nt!PspTerminateThreadByPointer+0x80
ffffc706`b442f8f0 fffff807`7db21e1b : ffffdb04`84709040 00000000`00000000 ffffdb04`84947080 00000000`00000000 : nt!PspTerminateAllThreads+0xcb
ffffc706`b442f960 fffff807`7db21bf1 : ffffffff`ffffffff ffffdb04`7f0d50c0 ffffdb04`7f40e040 ffffdb04`84947080 : nt!PspTerminateProcess+0xe7
ffffc706`b442f9a0 fffff807`7d82bce5 : ffffdb04`00003840 ffffdb04`7f40e040 ffffdb04`84947080 ffffdb04`80c13270 : nt!NtTerminateProcess+0xb1
ffffc706`b442fa20 00007ff8`06faf8f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000fe`d027f228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`06faf8f4


SYMBOL_NAME: nt!KiFastFailDispatch+b2

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.3155

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: b2

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------

18: kd> lmvm nt
Browse full module list
start end module name
fffff807`7d400000 fffff807`7e447000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\2A832A6884144D88C39DB4B4DB66D71C1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\6479E1C71047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 6479E1C7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00B876D8
ImageSize: 01047000
File version: 10.0.22621.3155
Product version: 10.0.22621.3155
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.22621.3155
FileVersion: 10.0.22621.3155 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
Ciao, hai fatto clean install da zero oppure solo ripristino?

Io proverei per prima cosa a fare installazione pulita e configurazione completa del sistema operativo con il tool di Microsoft.

In questo modo si esclude al 100% un problema di installazione, configurazione, driver, aggiornamenti etc etc.

Inoltre è cosa buona e giusta mettere OS su M.2 dedicato (da 500/512GB basta e avanza) e tenerlo separato dal resto.
 
Last edited:
grazie mille per la risposta tempestiva Ekans2011.
ho fatto un ripristino normale dal menù di ripristino/riavvio avanzato poiché avevo paura di invalidare in qualche modo la garanzia.
Posso eseguire un clean install disattivando bitlocker e formattando da zero il drive utilizzando diskpart in fase di selezione dell'unità di installazione, senza incorrere in problemi di garanzia e utilizzare la stessa chiave di licenza windows 11 pro?
Sempre a tal proposito, volendo seguire il consiglio di installare l'os su m.2 dedicato, per i laptop pcspecialist si applica una garanzia 'open case' come per i fissi, tale per cui posso installlare un m.2 in autonomia nel 2° slot o dovrei rispedire il portatile per l'upgrade?
 

Ekans2011

VALUED CONTRIBUTOR
grazie mille per la risposta tempestiva Ekans2011.
ho fatto un ripristino normale dal menù di ripristino/riavvio avanzato poiché avevo paura di invalidare in qualche modo la garanzia.
Posso eseguire un clean install disattivando bitlocker e formattando da zero il drive utilizzando diskpart in fase di selezione dell'unità di installazione, senza incorrere in problemi di garanzia e utilizzare la stessa chiave di licenza windows 11 pro?
Sempre a tal proposito, volendo seguire il consiglio di installare l'os su m.2 dedicato, per i laptop pcspecialist si applica una garanzia 'open case' come per i fissi, tale per cui posso installlare un m.2 in autonomia nel 2° slot o dovrei rispedire il portatile per l'upgrade?
Certo, puoi fare tutto quello che vuoi a patto di non fare danni e non invaliderai mai la garanzia.
Fai clean install e vediamo se era un problema di file system corrotto, driver, aggiornamento corrotto etc etc.

EDIT: Scarica il tool da https://www.microsoft.com/software-download/windows11 e crea USB avviabile (>8GB).
Poi elimina tutte le partizioni eventuali presenti sul drive e installa OS senza creare nessuna partizione: Windows crea automaticamente quelle necessarie.

Una volta completata l'installazione procedi con Windows Update finché tutti gli aggiornamenti (principali e opzionali) saranno installati.
Infine installa i driver video dal sito NVIDIA per la GPU (o tramite GeForce Experience).

La chiave di Windows è legata al tuo account Microsoft e si attiverà automaticamente in fase di installazione.
 
Last edited:
Top