Dłuższe listingi zawijaj w znaczniki code.
Problem z kodem błędu 0XD1 wskazuje na oprogramowania antywirusowe AVG 2014.
Proszę je usunąć w trybie awaryjnym (może być przez deinstalator
http://www.avg.com/eu-en/utilities ) i normalnie odpalić komputer.
Dodatkowo system jest bez SP3 i prosi się o jego instalację (instalka z sieci waży coś koło 300MB)
Partycję systemową to już musisz sobie sam poczyścić - w sieci jest mnóstwo poradników jak optymalizować i pielęgnować XP-ka.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.100216-1441
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x80553420
Debug session time: Mon Mar 3 08: 30: 25.640 2014 (UTC + 1: 00)
System Uptime: 0 days 0: 01: 44.203
Loading Kernel Symbols
...............................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
............
Unable to load image avgtpx86.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtpx86.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtpx86.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {2f0f1a60, ff, 1, a7db1d4a}
Probably caused by : avgtpx86.sys ( avgtpx86+4d4a )
Followup: MachineOwner
---------
kd> !analyze -v;
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 2f0f1a60, memory referenced
Arg2: 000000ff, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: a7db1d4a, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 2f0f1a60
CURRENT_IRQL: ff
FAULTING_IP:
avgtpx86+4d4a
a7db1d4a 8701 xchg eax,dword ptr [ecx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from a7dae55e to a7db1d4a
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
f78cec5c a7dae55e 804fd9ec a7dae342 00000000 avgtpx86+0x4d4a
f78cec7c 80575864 8594fd68 8647a000 00000000 avgtpx86+0x155e
f78ced4c 80575973 0000030c 00000001 00000000 nt!IopLoadDriver+0x66c
f78ced74 8053400e 0000030c 00000000 865c9da8 nt!IopLoadUnloadDriver+0x45
f78cedac 805c4d5e a82a0cf4 00000000 00000000 nt!ExpWorkerThread+0x100
f78ceddc 805411f2 80533f0e 00000001 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
avgtpx86+4d4a
a7db1d4a 8701 xchg eax,dword ptr [ecx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: avgtpx86+4d4a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: avgtpx86
IMAGE_NAME: avgtpx86.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 52d54e23
FAILURE_BUCKET_ID: 0xD1_avgtpx86+4d4a
BUCKET_ID: 0xD1_avgtpx86+4d4a
Followup: MachineOwner
---------