*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff80d7ac959b70, Address of the instruction which caused the bugcheck
Arg3: ffff9d8084e28320, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12228
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff80d7ac959b70
BUGCHECK_P3: ffff9d8084e28320
BUGCHECK_P4: 0
CONTEXT: ffff9d8084e28320 -- (.cxr 0xffff9d8084e28320)
rax=0000000000000080 rbx=ffff80a442d59d57 rcx=ffff80a44078c926
rdx=7e07ce3e0000ffff rsi=0000000000000000 rdi=ffff80a442d59d70
rip=ffff80d7ac959b70 rsp=ffff9d8084e28d20 rbp=ffff80d7ab83c0c0
r8=ffffa30f7f4e6748 r9=000000000000000a r10=0000000000000007
r11=ffff80a442d59d70 r12=0000000000000057 r13=0000000000000100
r14=0000000000000000 r15=ffff80d7ab806ea0
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00250297
win32kfull!EditionUpdateAsyncKeyStateThreads+0x40:
ffff80d7`ac959b70 410fb68411c4000000 movzx eax,byte ptr [r9+rdx+0C4h] ds:002b:7e07ce3e`000100cd=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffff9d80`84e28d20 ffff80d7`ab659010 : ffff80a4`4061d010 00000000`00000000 ffffffff`ffffffff ffff80d7`ac88b03b : win32kfull!EditionUpdateAsyncKeyStateThreads+0x40
ffff9d80`84e28d50 ffff80d7`ab658ebe : ffff80a4`42d59d70 ffff9d80`84e28dd0 ffff80d7`ab8468a0 00000000`00000057 : win32kbase!ApiSetEditionUpdateAsyncKeyStateThreads+0x74
ffff9d80`84e28d90 ffff80d7`ab658afe : ffffffff`ffffffff 00000000`00000057 ffff80a4`4061d010 00000000`00000100 : win32kbase!UpdateAsyncKeyState+0x6e
ffff9d80`84e28de0 ffff80d7`ab658982 : ffff9d80`84e290e0 ffff9d80`84e28fc9 00000000`00000000 ffff9d80`84e290e0 : win32kbase!xxxUpdateGlobalsAndSendKeyEvent+0x13e
ffff9d80`84e28f10 ffff80d7`ab7a8e8a : ffff9d80`84e20000 ffff9d80`84e290d0 00000000`00016abb 00000000`00000000 : win32kbase!xxxKeyEventEx+0x1e2
ffff9d80`84e29010 ffff80d7`ab7a8b07 : ffff80a4`40606a30 00000000`00000000 ffff9d80`84e29190 ffffa30f`7f5dd0c8 : win32kbase!xxxProcessKeyEvent+0x2da
ffff9d80`84e29090 ffff80d7`ab79a508 : 00000000`00000000 ffffa30f`7e89f170 ffff80a4`40606a30 ffff7cff`1a200000 : win32kbase!ProcessKeyboardInputWorker+0x837
ffff9d80`84e291f0 ffff80d7`ab79a389 : ffff80d7`ab84b6d0 ffff9d80`84e29301 00000000`00000000 ffffa30f`7f505810 : win32kbase!CKeyboardProcessor::ProcessInputNoLock+0xdc
ffff9d80`84e29220 ffff80d7`ab7a2d3d : ffff80a4`406069e0 ffffa30f`7f5dd070 00000000`0000000c 00000000`00000000 : win32kbase!CKeyboardProcessor::ProcessInput+0x491
ffff9d80`84e29360 ffff80d7`ab79c04a : ffff80d7`ab800700 ffff9d80`84e294a0 ffff80a4`406069e0 ffff80d7`ab841970 : win32kbase!CKeyboardSensor::ProcessInput+0x5d
ffff9d80`84e293a0 ffff80d7`ab654c1d : 00000000`00000040 ffff80d7`ab800700 00000000`00000001 00000000`00000000 : win32kbase!CBaseInput::OnReadNotification+0x52a
ffff9d80`84e294e0 ffff80d7`ab654d52 : ffffa30f`7f5d9080 ffff80a4`40684920 00000000`00000006 ffff2fca`f20427ed : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
ffff9d80`84e29620 ffff80d7`ab6486de : ffff80d7`ab8482a0 ffff80a4`40684920 ffff80d7`ab841970 00000000`00000001 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffff9d80`84e29650 ffff80d7`ab648430 : 00000000`00000006 ffff80d7`ab8482a0 00000000`00000006 ffff80a4`406cf200 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffff9d80`84e29680 ffff80d7`ac929e7f : 00000000`0000008d 00000000`00000001 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffff9d80`84e297b0 ffff80d7`ab6b60c3 : ffffa30f`7f5d9080 ffffa30f`7f5d9080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff9d80`84e29970 ffff80d7`ac8c8d80 : ffffa30f`7f5d9080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff9d80`84e29aa0 ffff80d7`ab25474d : ffffa30f`7f5d9080 ffffa30f`7f5d9080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff9d80`84e29ad0 fffff807`658071b8 : ffffa30f`00000005 00000000`00000005 000001c9`d16040b0 00000000`000003fc : win32k!NtUserCallNoParam+0x15
ffff9d80`84e29b00 00007ff9`8bfc10e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000035`344bfad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8bfc10e4
SYMBOL_NAME: win32kfull!EditionUpdateAsyncKeyStateThreads+40
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .cxr 0xffff9d8084e28320 ; kb
BUCKET_ID_FUNC_OFFSET: 40
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!EditionUpdateAsyncKeyStateThreads
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73803c48-af25-9cef-3c1a-7fdde3a1a578}
Followup: MachineOwner
---------