*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffff82db763fbe84, Address of the instruction which caused the BugCheck
Arg3: fffffa034786e170, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 3124
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 3130
    Key  : Analysis.Init.CPU.mSec
    Value: 4218
    Key  : Analysis.Init.Elapsed.mSec
    Value: 48003
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 111
    Key  : WER.OS.Branch
    Value: co_release
    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z
    Key  : WER.OS.Version
    Value: 10.0.22000.1
FILE_IN_CAB:  061822-5140-01.dmp
BUGCHECK_CODE:  3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff82db763fbe84
BUGCHECK_P3: fffffa034786e170
BUGCHECK_P4: 0
CONTEXT:  fffffa034786e170 -- (.cxr 0xfffffa034786e170)
rax=0000000000001b08 rbx=ff3f828bc0ac9980 rcx=0000000000000008
rdx=0000000000000004 rsi=000000000000800b rdi=ff3f828bc0ac9980
rip=ffff82db763fbe84 rsp=fffffa034786eb90 rbp=fffffa034786ec90
 r8=ffff8a00fe643610  r9=0000000000000014 r10=ffff8a00fe2481a0
r11=fffffa034786eb60 r12=0000000000000001 r13=0000000000000000
r14=fffffa034786ec90 r15=ffff828bc0b508a0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
win32kfull!xxxWindowEvent+0x324:
ffff82db`763fbe84 8b4b28          mov     ecx,dword ptr [rbx+28h] ds:002b:ff3f828b`c0ac99a8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  Discord.exe
STACK_TEXT: 
fffffa03`4786eb90 ffff82db`763eb2a5     : 00000000`00000200 fffffa03`4786fb60 ffff828b`c0b508a0 00000000`00000000 : win32kfull!xxxWindowEvent+0x324
fffffa03`4786ed00 ffff82db`763e6371     : ffff828b`c0b508a0 ffff828b`c0b508a0 00000000`00000000 00000000`007f5ef4 : win32kfull!xxxScanSysQueue+0x2505
fffffa03`4786f610 ffff82db`763e580b     : fffffa03`4786f9c0 00000000`003cde00 00000000`00000000 00000000`0042a000 : win32kfull!xxxRealInternalGetMessage+0xa61
fffffa03`4786f970 ffff82db`76c97645     : ffffce09`5e3b1080 00000000`003cde38 fffffa03`4786fa88 00000000`0042a000 : win32kfull!NtUserPeekMessage+0xab
fffffa03`4786fa20 fffff804`3b829e78     : 00000000`00000000 00000000`00000001 ffffb464`68bd4274 00000000`459c8234 : win32k!NtUserPeekMessage+0x29
fffffa03`4786fa70 00007fff`62e713c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`003cde18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`62e713c4
SYMBOL_NAME:  win32kfull!xxxWindowEvent+324
MODULE_NAME: win32kfull
IMAGE_NAME:  win32kfull.sys
IMAGE_VERSION:  10.0.22000.739
STACK_COMMAND:  .cxr 0xfffffa034786e170 ; kb
BUCKET_ID_FUNC_OFFSET:  324
FAILURE_BUCKET_ID:  AV_win32kfull!xxxWindowEvent
OS_VERSION:  10.0.22000.1
BUILDLAB_STR:  co_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {23eb2dec-d3d0-12d3-3e8a-7209549ee315}
Followup:     MachineOwner
---------