*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffff82db763fbe84, Address of the instruction which caused the BugCheck
Arg3: fffffa034786e170, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3130
Key : Analysis.Init.CPU.mSec
Value: 4218
Key : Analysis.Init.Elapsed.mSec
Value: 48003
Key : Analysis.Memory.CommitPeak.Mb
Value: 111
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 061822-5140-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff82db763fbe84
BUGCHECK_P3: fffffa034786e170
BUGCHECK_P4: 0
CONTEXT: fffffa034786e170 -- (.cxr 0xfffffa034786e170)
rax=0000000000001b08 rbx=ff3f828bc0ac9980 rcx=0000000000000008
rdx=0000000000000004 rsi=000000000000800b rdi=ff3f828bc0ac9980
rip=ffff82db763fbe84 rsp=fffffa034786eb90 rbp=fffffa034786ec90
r8=ffff8a00fe643610 r9=0000000000000014 r10=ffff8a00fe2481a0
r11=fffffa034786eb60 r12=0000000000000001 r13=0000000000000000
r14=fffffa034786ec90 r15=ffff828bc0b508a0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
win32kfull!xxxWindowEvent+0x324:
ffff82db`763fbe84 8b4b28 mov ecx,dword ptr [rbx+28h] ds:002b:ff3f828b`c0ac99a8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
fffffa03`4786eb90 ffff82db`763eb2a5 : 00000000`00000200 fffffa03`4786fb60 ffff828b`c0b508a0 00000000`00000000 : win32kfull!xxxWindowEvent+0x324
fffffa03`4786ed00 ffff82db`763e6371 : ffff828b`c0b508a0 ffff828b`c0b508a0 00000000`00000000 00000000`007f5ef4 : win32kfull!xxxScanSysQueue+0x2505
fffffa03`4786f610 ffff82db`763e580b : fffffa03`4786f9c0 00000000`003cde00 00000000`00000000 00000000`0042a000 : win32kfull!xxxRealInternalGetMessage+0xa61
fffffa03`4786f970 ffff82db`76c97645 : ffffce09`5e3b1080 00000000`003cde38 fffffa03`4786fa88 00000000`0042a000 : win32kfull!NtUserPeekMessage+0xab
fffffa03`4786fa20 fffff804`3b829e78 : 00000000`00000000 00000000`00000001 ffffb464`68bd4274 00000000`459c8234 : win32k!NtUserPeekMessage+0x29
fffffa03`4786fa70 00007fff`62e713c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`003cde18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`62e713c4
SYMBOL_NAME: win32kfull!xxxWindowEvent+324
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.22000.739
STACK_COMMAND: .cxr 0xfffffa034786e170 ; kb
BUCKET_ID_FUNC_OFFSET: 324
FAILURE_BUCKET_ID: AV_win32kfull!xxxWindowEvent
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {23eb2dec-d3d0-12d3-3e8a-7209549ee315}
Followup: MachineOwner
---------