Reincio con bluescreen minidump

Cerrado
PoyoPR Mensajes enviados 3 Fecha de inscripción viernes, 1 de junio de 2012 Estatus Miembro Última intervención jueves, 7 de noviembre de 2013 - 1 jun 2012 a las 06:59
PoyoPR Mensajes enviados 3 Fecha de inscripción viernes, 1 de junio de 2012 Estatus Miembro Última intervención jueves, 7 de noviembre de 2013 - 4 jun 2012 a las 05:54
Hola, que tal, desde hace un par de días mi pc se esta reiniciando con la famosa bluescreen y no necesariamente pasa cuando estoy utilizando al maximo su capacidad, el error es este.. espero que me puedan ayudar, nose como solucionarlo y la pc tiene 1 mes uso, es una i5, windows 7 home premium, 3gb de ram

Nombre del evento de problema: BlueScreen
Versión del sistema operativo: 6.1.7601.2.1.0.768.3
Id. de configuración regional: 1034

Información adicional del problema:
BCCode: 19
BCP1: 00000003
BCP2: B8D9C6A8
BCP3: 7D9CC86F
BCP4: B8D9C6A8
OS Version: 6_1_7601
Service Pack: 1_0
Product: 768_1

Archivos que ayudan a describir el problema:
C:\Windows\Minidump\053112-21715-01.dmp
C:\Users\Matias\AppData\Local\Temp\WER-31730-0.sysdata.xml

Lea nuestra declaración de privacidad en línea:
https://privacy.microsoft.com/es-es/windows-7-privacy-statement

Si la declaración de privacidad en línea no está disponible, lea la declaración de privacidad sin conexión:
C:\windows\system32\es-ES\erofflps.txt

1 respuesta

PoyoPR Mensajes enviados 3 Fecha de inscripción viernes, 1 de junio de 2012 Estatus Miembro Última intervención jueves, 7 de noviembre de 2013
4 jun 2012 a las 05:54
Alguien que me ayude! aqui les pego el log del error


WARNING: Whitespace at start of path element

Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\060412-23883-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

WARNING: Whitespace at start of path element
Symbol search path is:
Executable search path is:
Unable to load image \SystemRoot\system32\ntkrnlpa.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for ntkrnlpa.exe
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
Machine Name:
Kernel base = 0x82c0f000 PsLoadedModuleList = 0x82d584d0
Debug session time: Mon Jun 4 00:50:32.818 2012 (UTC - 3:00)
System Uptime: 0 days 0:18:34.129
Unable to load image \SystemRoot\system32\ntkrnlpa.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntkrnlpa.exe
*** ERROR: Module load completed but symbols could not be loaded for ntkrnlpa.exe
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: c0640010, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 82c97086, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000009, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for mssmbios.sys
*** ERROR: Module load completed but symbols could not be loaded for mssmbios.sys
*** WARNING: Unable to verify timestamp for Ntfs.sys
*** ERROR: Module load completed but symbols could not be loaded for Ntfs.sys
*** WARNING: Unable to verify timestamp for fltmgr.sys
*** ERROR: Module load completed but symbols could not be loaded for fltmgr.sys
***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************

ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

MODULE_NAME: nt

FAULTING_MODULE: 82c0f000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4f766ae5

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
c0640010

FAULTING_IP:
nt+88086
82c97086 8b06 mov eax,dword ptr [esi]

MM_INTERNAL_CODE: 9

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x50

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from 82c50468 to 82c9d3bf

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
b61e8f84 82c50468 00000000 c0640010 00000000 nt+0x8e3bf
b61e8f9c 82c97086 badb0d00 00000004 00000000 nt+0x41468
b61e9064 8b051d1f 863ddb88 00000000 00000001 nt+0x88086
b61e9084 8b04d367 85c6f728 00000020 b61e9128 Ntfs+0xdd1f
b61e9100 8b052960 b61e9320 8a92f0f8 85c6f728 Ntfs+0x9367
b61e923c 8b056720 b61e9320 85c6f728 8a92f0f8 Ntfs+0xe960
b61e9310 8b057cf7 b61e9320 85c6f728 00c8070a Ntfs+0x12720
b61e9454 82c465be 863c3020 85c6f728 85c6f728 Ntfs+0x13cf7
b61e946c 833b520c 863d5c30 85c6f728 00000000 nt+0x375be
b61e9490 833b53cb b61e94b0 863d5c30 00000000 fltmgr+0x620c
b61e94c8 82c465be 863d5c30 85c6f728 85c6f728 fltmgr+0x63cb
b61e94e0 82cd39be 863ddb40 85e79230 863ddb10 nt+0x375be
b61e94fc 82cb6590 85d069a0 85e79230 863ddb48 nt+0xc49be
b61e9594 82c9f91b 82d79100 b5f85000 863ddb10 nt+0xa7590
b61e961c 82c50468 00000000 b5f85000 00000000 nt+0x9091b
b61e9634 82e40f57 badb0d00 00000000 00000001 nt+0x41468
b61e96e8 8b0ed2d5 85d069a0 b61e9720 00001000 nt+0x231f57
b61e9710 8b0f2901 85b9f170 8a92f0f8 00005000 Ntfs+0xa92d5
b61e9740 8b0de772 85b9f170 0000000c 00000005 Ntfs+0xae901
b61e9770 8b0d4b7e 85b9f170 c43b9908 bc839060 Ntfs+0x9a772
b61e988c 8b0d6ded 85b9f170 c2d41e58 8a92f0f8 Ntfs+0x90b7e
b61e9a98 8b0f2ce6 85b9f170 864425d8 863c30d8 Ntfs+0x92ded
b61e9acc 8b0f2e2f 85b9f170 c2d41e58 3d16b04e Ntfs+0xaece6
b61e9b34 82c465be 863c3020 864425d8 864425d8 Ntfs+0xaee2f
b61e9b4c 833b520c 863d5c30 864425d8 00000000 nt+0x375be
b61e9b70 833b53cb b61e9b90 863d5c30 00000000 fltmgr+0x620c
b61e9ba8 82c465be 863d5c30 864425d8 864425d8 fltmgr+0x63cb
b61e9bc0 82e39b09 00000398 006f9ff4 82e43e7b nt+0x375be
b61e9be0 82e43ed6 863d5c30 856412f0 00000001 nt+0x22ab09
b61e9c00 82c4d27a 00000398 00000000 00000000 nt+0x234ed6
b61e9c34 77907094 badb0d00 006f9fc8 00000000 nt+0x3e27a
b61e9c38 badb0d00 006f9fc8 00000000 00000000 0x77907094
b61e9c3c 006f9fc8 00000000 00000000 00000000 0xbadb0d00
b61e9c40 00000000 00000000 00000000 00000000 0x6f9fc8


STACK_COMMAND: kb

FOLLOWUP_IP:
nt+88086
82c97086 8b06 mov eax,dword ptr [esi]

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt+88086

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: ntkrnlpa.exe

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner
---------
0