De acordo com o despejo, o Kernel está corrompido em 1 Bit:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffb8, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80003fba634, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
Could not read faulting driver name
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
STACK_TEXT:
nt!KeBugCheckEx
nt! ?? ::FNODOBFM::'string'
nt!KiPageFault
nt!NtReadFile
nt!KiSystemServiceCopyEnd
nt!KiServiceLinkage
win32k!StartDeviceRead
win32k!InputApc
nt!KiDeliverApc
nt!KiCommitThreadWait
nt!KeWaitForMultipleObjects
win32k!xxxMsgWaitForMultipleObjects
win32k!xxxDesktopThread
win32k!xxxCreateSystemThreads
win32k!NtUserCallNoParam
nt!KiSystemServiceCopyEnd
0x0
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80003fba630 - nt!NtReadFile+5ae
[ b8:38 ]
1 error : !nt (fffff80003fba630)
MODULE_NAME: memory_corruption
Execute sfc /scannow
para verificar se há ntkrnlmp.exe danificado.