Its not really Nvidia's fault but a lot of users have reported certain issues with the GTX560Ti series cards.
Update your Nvidia Driver NVIDIA DRIVERS 285.62 WHQL
Test it with OCCT
https://www.sevenforums.com/tutorials...test-occt.html
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffffffff8521f2d5, 9, 0, fffff880130c33c8}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+773c8 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffff8521f2d5, memory referenced
Arg2: 0000000000000009, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880130c33c8, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800034fa100
ffffffff8521f2d5
CURRENT_IRQL: 9
FAULTING_IP:
nvlddmkm+773c8
fffff880`130c33c8 33d2 xor edx,edx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: pes2012.exe
TRAP_FRAME: fffff880009b02f0 -- (.trap 0xfffff880009b02f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000017ede rbx=0000000000000000 rcx=fffffa80041b8200
rdx=0000000000017ede rsi=0000000000000000 rdi=0000000000000000
rip=fffff880130c33c8 rsp=fffff880009b0480 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=fffff8801383d5b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0x773c8:
fffff880`130c33c8 33d2 xor edx,edx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032c71e9 to fffff800032c7c40
STACK_TEXT:
fffff880`009b01a8 fffff800`032c71e9 : 00000000`0000000a ffffffff`8521f2d5 00000000`00000009 00000000`00000000 : nt!KeBugCheckEx
fffff880`009b01b0 fffff800`032c5e60 : 3c81a000`00000000 bd44e700`c44d505b 00000000`00000041 fffff880`13c6f200 : nt!KiBugCheckDispatch+0x69
fffff880`009b02f0 fffff880`130c33c8 : fffffa80`07b124a0 fffff880`009b0868 fffffa80`04db0000 fffffa80`046d9450 : nt!KiPageFault+0x260
fffff880`009b0480 fffffa80`07b124a0 : fffff880`009b0868 fffffa80`04db0000 fffffa80`046d9450 00000000`00000000 : nvlddmkm+0x773c8
fffff880`009b0488 fffff880`009b0868 : fffffa80`04db0000 fffffa80`046d9450 00000000`00000000 fffff880`1312f624 : 0xfffffa80`07b124a0
fffff880`009b0490 fffffa80`04db0000 : fffffa80`046d9450 00000000`00000000 fffff880`1312f624 00000000`00000001 : 0xfffff880`009b0868
fffff880`009b0498 fffffa80`046d9450 : 00000000`00000000 fffff880`1312f624 00000000`00000001 fffffa80`00000000 : 0xfffffa80`04db0000
fffff880`009b04a0 00000000`00000000 : fffff880`1312f624 00000000`00000001 fffffa80`00000000 00000000`00000000 : 0xfffffa80`046d9450
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+773c8
fffff880`130c33c8 33d2 xor edx,edx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+773c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d866a30
FAILURE_BUCKET_ID: X64_0xD1_nvlddmkm+773c8
BUCKET_ID: X64_0xD1_nvlddmkm+773c8
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffff8521f2d5, memory referenced
Arg2: 0000000000000009, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880130c33c8, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: ffffffff8521f2d5
CURRENT_IRQL: 9
FAULTING_IP:
nvlddmkm+773c8
fffff880`130c33c8 33d2 xor edx,edx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: pes2012.exe
TRAP_FRAME: fffff880009b02f0 -- (.trap 0xfffff880009b02f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000017ede rbx=0000000000000000 rcx=fffffa80041b8200
rdx=0000000000017ede rsi=0000000000000000 rdi=0000000000000000
rip=fffff880130c33c8 rsp=fffff880009b0480 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=fffff8801383d5b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0x773c8:
fffff880`130c33c8 33d2 xor edx,edx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032c71e9 to fffff800032c7c40
STACK_TEXT:
fffff880`009b01a8 fffff800`032c71e9 : 00000000`0000000a ffffffff`8521f2d5 00000000`00000009 00000000`00000000 : nt!KeBugCheckEx
fffff880`009b01b0 fffff800`032c5e60 : 3c81a000`00000000 bd44e700`c44d505b 00000000`00000041 fffff880`13c6f200 : nt!KiBugCheckDispatch+0x69
fffff880`009b02f0 fffff880`130c33c8 : fffffa80`07b124a0 fffff880`009b0868 fffffa80`04db0000 fffffa80`046d9450 : nt!KiPageFault+0x260
fffff880`009b0480 fffffa80`07b124a0 : fffff880`009b0868 fffffa80`04db0000 fffffa80`046d9450 00000000`00000000 : nvlddmkm+0x773c8
fffff880`009b0488 fffff880`009b0868 : fffffa80`04db0000 fffffa80`046d9450 00000000`00000000 fffff880`1312f624 : 0xfffffa80`07b124a0
fffff880`009b0490 fffffa80`04db0000 : fffffa80`046d9450 00000000`00000000 fffff880`1312f624 00000000`00000001 : 0xfffff880`009b0868
fffff880`009b0498 fffffa80`046d9450 : 00000000`00000000 fffff880`1312f624 00000000`00000001 fffffa80`00000000 : 0xfffffa80`04db0000
fffff880`009b04a0 00000000`00000000 : fffff880`1312f624 00000000`00000001 fffffa80`00000000 00000000`00000000 : 0xfffffa80`046d9450
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+773c8
fffff880`130c33c8 33d2 xor edx,edx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+773c8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d866a30
FAILURE_BUCKET_ID: X64_0xD1_nvlddmkm+773c8
BUCKET_ID: X64_0xD1_nvlddmkm+773c8