Gracias, miraré lo que decís. A ver si de todas formas entra alguien que haya pasado ya por esto.
Copio lo que dice el informe del error, a ver si alguien sabe algo:
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+248 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000080000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000080000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000080000
CURRENT_IRQL: 2
FAULTING_IP:
+eacff70000
00000000`00080000 ?? ???
PROCESS_NAME: System
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
DPC_STACK_BASE: FFFFF80390A2FFB0
TRAP_FRAME: fffff80390a28720 -- (.trap 0xfffff80390a28720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000001a52ba rbx=0000000000000000 rcx=ffffe00087f25060
rdx=0020000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000080000 rsp=fffff80390a288b8 rbp=0020000000000000
r8=000000000002082f r9=000000000000002f r10=fffff8038ee0c3c0
r11=fffff8038ee7b000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00080000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8038efd36a9 to fffff8038efc8d00
FAILED_INSTRUCTION_ADDRESS:
+eacff70000
00000000`00080000 ?? ???
STACK_TEXT:
fffff803`90a285d8 fffff803`8efd36a9 : 00000000`0000000a 00000000`00080000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff803`90a285e0 fffff803`8efd1ec8 : ffff5817`454689d9 ffffe000`8a4bf000 fffff803`8f1de180 00000000`00000008 : nt!KiBugCheckDispatch+0x69
fffff803`90a28720 00000000`00080000 : fffff803`8ee805b7 ffffe000`87f25060 ffffe000`00000001 ffffe000`87f25068 : nt!KiPageFault+0x248
fffff803`90a288b8 fffff803`8ee805b7 : ffffe000`87f25060 ffffe000`00000001 ffffe000`87f25068 00000001`00000002 : 0x80000
fffff803`90a288c0 fffff803`8ee800bf : 00000000`00000003 0000003e`c2617d29 0000003e`c2617d29 fffff803`8f1a6bb0 : nt!KiExpireTimer2+0x357
fffff803`90a289c0 fffff803`8eeca33e : fffff803`8f254740 00000000`003e967b 00000000`000fb099 00000000`00000000 : nt!KiTimer2Expiration+0xdf
fffff803`90a28a10 fffff803`8efcba5a : fffff803`8f1de180 fffff803`8f1de180 fffff803`8f254740 ffffe000`8c541080 : nt!KiRetireDpcList+0x60e
fffff803`90a28c60 00000000`00000000 : fffff803`90a29000 fffff803`90a23000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+248
fffff803`8efd1ec8 33c0 xor eax,eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+248
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 55c5a3b2
BUCKET_ID_FUNC_OFFSET: 248
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_bad_ip_nt!kipagefault
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner