kai1991
Ensign
- Registriert
- Juli 2013
- Beiträge
- 210
Arlt Computer ist meines Wissens der Einzige Fachhandel in meiner Umgebebung... Daher vermutlich der hohe Preis -.-
BIOS hab ich eben noch auf 3.2 geflasht und jz stell ich wieder den Ram ein. Morgen bau ich das NT aus und das Alte wieder ein. und dann klau ich die Graka meiner Eltern und leih denen meine XD Die haben n LC Power LC5550 Netzteil. Das müsste eig reichen?! Die surfen ja eh nur auf ebay...
war gerade nur bei Amazon unterwegs und hab diese Seite im Auge behalten...
Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091613-33259-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18229.amd64fre.win7sp1_gdr.130801-1533
Machine Name:
Kernel base = 0xfffff800`0300e000 PsLoadedModuleList = 0xfffff800`032516d0
Debug session time: Mon Sep 16 22:25:24.727 2013 (UTC + 2:00)
System Uptime: 0 days 0:22:12.991
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff900e49cb638, 0, fffff9600013d41d, 2}
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!HMValidateHandleNoSecure+7d )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900e49cb638, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff9600013d41d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bb100
GetUlongFromAddress: unable to read from fffff800032bb1c0
fffff900e49cb638
FAULTING_IP:
win32k!HMValidateHandleNoSecure+7d
fffff960`0013d41d 488b03 mov rax,qword ptr [rbx]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800a2c5640 -- (.trap 0xfffff8800a2c5640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff900c0580a70 rbx=0000000000000000 rcx=00000000000001ca
rdx=fffff900c1d24e01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff9600013d41d rsp=fffff8800a2c57d0 rbp=fffff900c1d24ec8
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff900c1d22ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32k!HMValidateHandleNoSecure+0x7d:
fffff960`0013d41d 488b03 mov rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031005d4 to fffff80003083b80
STACK_TEXT:
fffff880`0a2c54d8 fffff800`031005d4 : 00000000`00000050 fffff900`e49cb638 00000000`00000000 fffff880`0a2c5640 : nt!KeBugCheckEx
fffff880`0a2c54e0 fffff800`03081cae : 00000000`00000000 fffff900`e49cb638 00000000`00000000 fffff900`c0402af0 : nt! ?? ::FNODOBFM::`string'+0x43836
fffff880`0a2c5640 fffff960`0013d41d : 00000000`00000000 00000000`00000000 00000000`75312450 00000000`0017e9c0 : nt!KiPageFault+0x16e
fffff880`0a2c57d0 fffff960`0013db72 : fffff900`c06cb100 00000000`00000000 00000000`00000001 fffff800`033a8f7d : win32k!HMValidateHandleNoSecure+0x7d
fffff880`0a2c5800 fffff960`0013dd48 : fffff900`c1d24c20 fffff880`0a2c5b60 00000000`00000108 00000000`00000000 : win32k!FindQMsg+0x42
fffff880`0a2c5840 fffff960`0013baba : fffff900`c1d24c20 fffff880`0a2c5a28 00000000`00000000 fffffa80`00000000 : win32k!xxxReadPostMessage+0x78
fffff880`0a2c58c0 fffff960`0013bf95 : 00000000`00000000 fffff800`000025ff 00000000`00000000 fffffa80`ffffffff : win32k!xxxRealInternalGetMessage+0x40a
fffff880`0a2c59a0 fffff960`00134a27 : 00000000`0017fd20 00000000`00000000 fffff880`02fd7180 00000000`fffdb000 : win32k!xxxInternalGetMessage+0x35
fffff880`0a2c59e0 fffff800`03082e13 : fffffa80`07be3a50 00000000`0017e038 fffff880`0a2c5a88 00000000`75312450 : win32k!NtUserPeekMessage+0x77
fffff880`0a2c5a70 00000000`7536fdea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0017e018 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7536fdea
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!HMValidateHandleNoSecure+7d
fffff960`0013d41d 488b03 mov rax,qword ptr [rbx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!HMValidateHandleNoSecure+7d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5202f253
FAILURE_BUCKET_ID: X64_0x50_win32k!HMValidateHandleNoSecure+7d
BUCKET_ID: X64_0x50_win32k!HMValidateHandleNoSecure+7d
Followup: MachineOwner
---------
BIOS hab ich eben noch auf 3.2 geflasht und jz stell ich wieder den Ram ein. Morgen bau ich das NT aus und das Alte wieder ein. und dann klau ich die Graka meiner Eltern und leih denen meine XD Die haben n LC Power LC5550 Netzteil. Das müsste eig reichen?! Die surfen ja eh nur auf ebay...
Ergänzung ()
war gerade nur bei Amazon unterwegs und hab diese Seite im Auge behalten...
Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091613-33259-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18229.amd64fre.win7sp1_gdr.130801-1533
Machine Name:
Kernel base = 0xfffff800`0300e000 PsLoadedModuleList = 0xfffff800`032516d0
Debug session time: Mon Sep 16 22:25:24.727 2013 (UTC + 2:00)
System Uptime: 0 days 0:22:12.991
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff900e49cb638, 0, fffff9600013d41d, 2}
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!HMValidateHandleNoSecure+7d )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900e49cb638, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff9600013d41d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bb100
GetUlongFromAddress: unable to read from fffff800032bb1c0
fffff900e49cb638
FAULTING_IP:
win32k!HMValidateHandleNoSecure+7d
fffff960`0013d41d 488b03 mov rax,qword ptr [rbx]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800a2c5640 -- (.trap 0xfffff8800a2c5640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff900c0580a70 rbx=0000000000000000 rcx=00000000000001ca
rdx=fffff900c1d24e01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff9600013d41d rsp=fffff8800a2c57d0 rbp=fffff900c1d24ec8
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff900c1d22ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32k!HMValidateHandleNoSecure+0x7d:
fffff960`0013d41d 488b03 mov rax,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031005d4 to fffff80003083b80
STACK_TEXT:
fffff880`0a2c54d8 fffff800`031005d4 : 00000000`00000050 fffff900`e49cb638 00000000`00000000 fffff880`0a2c5640 : nt!KeBugCheckEx
fffff880`0a2c54e0 fffff800`03081cae : 00000000`00000000 fffff900`e49cb638 00000000`00000000 fffff900`c0402af0 : nt! ?? ::FNODOBFM::`string'+0x43836
fffff880`0a2c5640 fffff960`0013d41d : 00000000`00000000 00000000`00000000 00000000`75312450 00000000`0017e9c0 : nt!KiPageFault+0x16e
fffff880`0a2c57d0 fffff960`0013db72 : fffff900`c06cb100 00000000`00000000 00000000`00000001 fffff800`033a8f7d : win32k!HMValidateHandleNoSecure+0x7d
fffff880`0a2c5800 fffff960`0013dd48 : fffff900`c1d24c20 fffff880`0a2c5b60 00000000`00000108 00000000`00000000 : win32k!FindQMsg+0x42
fffff880`0a2c5840 fffff960`0013baba : fffff900`c1d24c20 fffff880`0a2c5a28 00000000`00000000 fffffa80`00000000 : win32k!xxxReadPostMessage+0x78
fffff880`0a2c58c0 fffff960`0013bf95 : 00000000`00000000 fffff800`000025ff 00000000`00000000 fffffa80`ffffffff : win32k!xxxRealInternalGetMessage+0x40a
fffff880`0a2c59a0 fffff960`00134a27 : 00000000`0017fd20 00000000`00000000 fffff880`02fd7180 00000000`fffdb000 : win32k!xxxInternalGetMessage+0x35
fffff880`0a2c59e0 fffff800`03082e13 : fffffa80`07be3a50 00000000`0017e038 fffff880`0a2c5a88 00000000`75312450 : win32k!NtUserPeekMessage+0x77
fffff880`0a2c5a70 00000000`7536fdea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0017e018 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7536fdea
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!HMValidateHandleNoSecure+7d
fffff960`0013d41d 488b03 mov rax,qword ptr [rbx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!HMValidateHandleNoSecure+7d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5202f253
FAILURE_BUCKET_ID: X64_0x50_win32k!HMValidateHandleNoSecure+7d
BUCKET_ID: X64_0x50_win32k!HMValidateHandleNoSecure+7d
Followup: MachineOwner
---------