Loading User Symbols
PEB is paged out (Peb.Ldr = 00000091`a4645018). Type ".hh dbgerr001" for details
Loading unloaded module list
............................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: ffff90971a9c042c, Address of the instruction which caused the BugCheck
Arg3: ffffe80e593167a0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2062
Key : Analysis.Elapsed.mSec
Value: 18139
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 35
Key : Analysis.Init.CPU.mSec
Value: 1656
Key : Analysis.Init.Elapsed.mSec
Value: 152576
Key : Analysis.Memory.CommitPeak.Mb
Value: 125
Key : Analysis.Version.DbgEng
Value: 10.0.29457.1000
Key : Analysis.Version.Description
Value: 10.2506.23.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2506.23.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 0x8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: 0x3B_C000001D_win32kbase!CMouseProcessor::CWheelEvent::GetWheelMessage
Key : Failure.Exception.IP.Address
Value: 0xffff90971a9c042c
Key : Failure.Exception.IP.Module
Value: win32kbase
Key : Failure.Exception.IP.Offset
Value: 0x1c042c
Key : Failure.Hash
Value: {d254c10b-e581-3c28-d918-7127d3b5ee7e}
Key : WER.System.BIOSRevision
Value: 5.24.0.0
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: ffff90971a9c042c
BUGCHECK_P3: ffffe80e593167a0
BUGCHECK_P4: 0
FILE_IN_CAB: 121125-8265-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
FAULTING_THREAD: ffff80813602f600
CONTEXT: ffffe80e593167a0 -- (.cxr 0xffffe80e593167a0)
rax=000000000000020a rbx=0000000000000001 rcx=ffffe80e59317590
rdx=ffffe80e593176d0 rsi=ffff90b6c064b000 rdi=0000000000000000
rip=ffff90971a9c042c rsp=ffffe80e593171a0 rbp=ffffe80e593172d0
r8=ffffe80e593176d0 r9=7fff90b6c06138a0 r10=7ffffffffffffffc
r11=ffffe80e593171b0 r12=ffff90b6c064b000 r13=ffffe80e59317590
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
win32kbase!CMouseProcessor::CWheelEvent::GetWheelMessage+0x10:
ffff9097`1a9c042c ea ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
ffffe80e`593171a0 ffff9097`1a9c185b : 0000018c`0000032e ffff90b6`c064b000 00000000`00000000 ffffe80e`593175a0 : win32kbase!CMouseProcessor::CWheelEvent::GetWheelMessage+0x10
ffffe80e`593171d0 ffff9097`1a9bf1a5 : 00000000`00000002 ffff90b6`c064b000 00000000`00000002 ffffe80e`593176d0 : win32kbase!CMouseProcessor::ProcessMouseWheel+0x17f
ffffe80e`59317560 ffff9097`1a84272f : ffff9097`1aa02c50 ffff9097`1aa54820 ffffe80e`593176d0 ffff90b6`c064bad8 : win32kbase!CMouseProcessor::ComputeAndDeliverMouseWheel+0x105
ffffe80e`593175d0 ffff9097`1a843826 : 00000000`00000001 00000000`00000000 ffff9097`1aa450c0 00000000`00000000 : win32kbase!CMouseProcessor::ProcessMouseEvent+0x36b
ffffe80e`59317850 ffff9097`1b6310f7 : 00000000`00000002 ffffffff`80001cd0 ffff9097`1aa450c0 00000000`00000000 : win32kbase!ProcessMouseEvent+0x16
ffffe80e`59317880 ffff9097`1a844595 : ffffe80e`593178e0 00000000`00000000 00000000`00000002 ffffe80e`00000000 : win32kfull!EditionHandleMitSignal+0x57
ffffe80e`593178c0 ffff9097`1a844506 : ffff90b6`c07b5a20 ffff90b6`c07b5010 00000000`00000000 00000000`00000000 : win32kbase!ApiSetEditionHandleMitSignal+0x6d
ffffe80e`59317900 ffff9097`1a84374f : 00000000`00000000 00000000`00000000 ffff9097`1aa450c0 00000000`00000000 : win32kbase!IOCPDispatcher::HandleThreadDispatcherSignal+0x66
ffffe80e`59317940 ffff9097`1a8436ed : 00000000`00000000 ffff9097`00000000 00000000`00000000 00000091`a4aff078 : win32kbase!IOCPDispatcher::Dispatch+0x1f
ffffe80e`593179a0 ffff9097`1a843568 : ffff8081`3602f601 00000000`00000000 ffff90b6`c06138a0 00000000`00000000 : win32kbase!UserDispatchMITCompletion+0x55
ffffe80e`593179e0 ffff9097`1ad0f8fa : ffff8081`3602f600 ffffe80e`59317ac0 0000020a`3d91f640 00000000`00000000 : win32kbase!NtMITDispatchCompletion+0x78
ffffe80e`59317a10 fffff805`16c11505 : ffff8081`3602f600 ffff8081`3f3ba9e0 ffffe80e`00000000 ffff8081`00000000 : win32k!NtMITDispatchCompletion+0x16
ffffe80e`59317a40 00007fff`c0f27704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000091`a4aff128 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`c0f27704
SYMBOL_NAME: win32kbase!CMouseProcessor::CWheelEvent::GetWheelMessage+10
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.6456
STACK_COMMAND: .cxr 0xffffe80e593167a0 ; kb
BUCKET_ID_FUNC_OFFSET: 10
FAILURE_BUCKET_ID: 0x3B_C000001D_win32kbase!CMouseProcessor::CWheelEvent::GetWheelMessage
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d254c10b-e581-3c28-d918-7127d3b5ee7e}
Followup: MachineOwner
---------