Windows XP SP3 Crash

By bahalbahal
Aug 19, 2009
Topic Status:
Not open for further replies.
  1. Hi All,

    I am running windows xp sp3 and my computer keep crashing every 8 to 9 hours. I have attached the dmp file. can any one help me on what I have to do?

    ERROR: FindPlugIns 8007007b

    thanks.
  2. raybay

    raybay TechSpot Evangelist Posts: 10,716   +6

    "Description: Windows does not recognize this file type.
    You may search the following Web site for related software and information:"
    Can you find a way to send the dump as a text file?
  3. bahalbahal

    bahalbahal Newcomer, in training Topic Starter

    this is what I get when I open the file with WinDbg


    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Documents and Settings\\Desktop\Mini081909-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is:
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Machine Name:
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x80554040
    Debug session time: Wed Aug 19 14:15:56.390 2009 (GMT-4)
    System Uptime: 0 days 5:49:49.984
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ...........
    ERROR: FindPlugIns 8007007b
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000000A, {4, 2, 0, 8051efe7}

    Probably caused by : memory_corruption ( nt!MmProbeAndLockSelectedPages+165 )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    ERROR: FindPlugIns 8007007b
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000004, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 8051efe7, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 00000004

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!MmProbeAndLockSelectedPages+165
    8051efe7 f6400401 test byte ptr [eax+4],1

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: iexplore.exe

    LAST_CONTROL_TRANSFER: from 00000000 to 8051efe7

    STACK_TEXT:
    b3a2c308 00000000 c00c1910 c00c1918 886e89a8 nt!MmProbeAndLockSelectedPages+0x165


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!MmProbeAndLockSelectedPages+165
    8051efe7 f6400401 test byte ptr [eax+4],1

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!MmProbeAndLockSelectedPages+165

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3

    IMAGE_NAME: memory_corruption

    FAILURE_BUCKET_ID: 0xA_nt!MmProbeAndLockSelectedPages+165

    BUCKET_ID: 0xA_nt!MmProbeAndLockSelectedPages+165

    Followup: MachineOwner
    ---------

    kd> lmvm nt
    start end module name
    804d7000 806cf680 nt M (pdb symbols) c:\windows\symbols\exe\ntoskrnl.pdb
    Loaded symbol image file: ntoskrnl.exe
    Image path: ntoskrnl.exe
    Image name: ntoskrnl.exe
    Timestamp: Fri Feb 06 05:32:51 2009 (498C11D3)
    CheckSum: 00206AC2
    ImageSize: 001F8680
    Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
    kd> p
    ^ No runnable debuggees error in 'p'
  4. bahalbahal

    bahalbahal Newcomer, in training Topic Starter

    any body????
  5. bahalbahal

    bahalbahal Newcomer, in training Topic Starter

    I again got this error. here is the new error massage. any one can help? looks like some driver fault thingi.

    Loading User Symbols
    Loading unloaded module list
    ...............................
    ERROR: FindPlugIns 8007007b
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000000A, {4, 2, 0, 8051efe7}

    Probably caused by : memory_corruption ( nt!MmProbeAndLockSelectedPages+165 )

    Followup: MachineOwner
    ---------

    kd> g
    ^ No runnable debuggees error in 'g'
    kd> !analyze -v
    ERROR: FindPlugIns 8007007b
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000004, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 8051efe7, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 00000004

    CURRENT_IRQL: 2

    FAULTING_IP:
    nt!MmProbeAndLockSelectedPages+165
    8051efe7 f6400401 test byte ptr [eax+4],1

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xA

    PROCESS_NAME: System

    LAST_CONTROL_TRANSFER: from 00000000 to 8051efe7

    STACK_TEXT:
    f7a7ed44 00000000 0021cd80 00000000 805586d4 nt!MmProbeAndLockSelectedPages+0x165


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!MmProbeAndLockSelectedPages+165
    8051efe7 f6400401 test byte ptr [eax+4],1

    SYMBOL_STACK_INDEX: 0

    SYMBOL_NAME: nt!MmProbeAndLockSelectedPages+165

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3

    IMAGE_NAME: memory_corruption

    FAILURE_BUCKET_ID: 0xA_nt!MmProbeAndLockSelectedPages+165

    BUCKET_ID: 0xA_nt!MmProbeAndLockSelectedPages+165

    Followup: MachineOwner
    ---------

    kd> lmvm nt
    start end module name
    804d7000 806cf680 nt M (pdb symbols) c:\windows\symbols\exe\ntoskrnl.pdb
    Loaded symbol image file: ntoskrnl.exe
    Image path: ntoskrnl.exe
    Image name: ntoskrnl.exe
    Timestamp: Fri Feb 06 05:32:51 2009 (498C11D3)
    CheckSum: 00206AC2
    ImageSize: 001F8680
    Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Topic Status:
Not open for further replies.


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.