*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8bb90e72ee1, Address of the instruction which caused the BugCheck
Arg3: ffff80839fd23f70, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5409
Key : Analysis.Init.CPU.mSec
Value: 561
Key : Analysis.Init.Elapsed.mSec
Value: 10251
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
FILE_IN_CAB: 020622-12171-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8bb90e72ee1
BUGCHECK_P3: ffff80839fd23f70
BUGCHECK_P4: 0
CONTEXT: ffff80839fd23f70 -- (.cxr 0xffff80839fd23f70)
rax=0000000000008008 rbx=fffff8808cf825e0 rcx=0000000000008000
rdx=000000000000c036 rsi=0000000000000000 rdi=00000000000000ff
rip=fffff8bb90e72ee1 rsp=ffff80839fd24978 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000001 r10=fffff8bb90e72ed0
r11=ffffa6fcfb800000 r12=0000000000000000 r13=0000000000000000
r14=fffff880869a0e70 r15=0000015d8ae8e949
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
win32kbase!RealGetProp+0x11:
fffff8bb`90e72ee1 8b4904 mov ecx,dword ptr [rcx+4] ds:002b:00000000`00008004=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffff8083`9fd24978 fffff8bb`91185d76 : 00000000`000000ff 00000281`00000530 fffff880`869a0e70 fffff880`8cf825e0 : win32kbase!RealGetProp+0x11
ffff8083`9fd24980 fffff8bb`9119fb1b : 00000000`000000ff 00000000`00000000 00000000`000000ff ffff8083`9fd24a89 : win32kfull!StoreQMessage+0x256
ffff8083`9fd249f0 fffff8bb`910e2ceb : fffff880`8b13c110 fffff880`8b13c110 ffff8083`9fd250e0 00000000`00000001 : win32kfull!PostInputMessage+0x18f
ffff8083`9fd24ad0 fffff8bb`91143349 : 00000000`08f2b9b8 00000000`00000000 00000000`08f2b9b8 fffff801`00000105 : win32kfull!PostRawKeyboardInputToSinks+0x28f
ffff8083`9fd24c30 fffff8bb`91143228 : 00000000`00000000 ffff8083`9fd24cf0 00000000`00000000 00000000`08f2b9b8 : win32kfull!HandleRawInput+0xc1
ffff8083`9fd24ca0 fffff8bb`90e1e97f : 00000000`00000103 00000000`00000000 00000000`00008009 00000000`00000009 : win32kfull!EditionHandleRawInput+0x68
ffff8083`9fd24d00 fffff8bb`90e1e8bb : 00000000`00000000 00000000`00000009 ffffffff`ffffffff fffff8bb`90e1ea27 : win32kbase!GetKeyEventInputSource+0xb0f
ffff8083`9fd24d70 fffff8bb`90e1d516 : ffffffff`ffffffff ffff8083`9fd24ec9 00000000`00000009 00000000`00000000 : win32kbase!GetKeyEventInputSource+0xa4b
ffff8083`9fd24de0 fffff8bb`90e1d2a2 : ffff8083`9fd250e0 ffff8083`9fd24fc9 00000000`00000000 ffff8083`9fd250e0 : win32kbase!xxxUpdateGlobalsAndSendKeyEvent+0x236
ffff8083`9fd24f10 fffff8bb`90fae1da : ffff8083`9fd20000 ffff8083`9fd250d0 00000000`08f2b9b8 00000000`00000000 : win32kbase!xxxKeyEventEx+0x1e2
ffff8083`9fd25010 fffff8bb`90fade57 : fffff880`80606a30 00000000`00000000 ffff8083`9fd25190 ffffdd88`5dc430c8 : win32kbase!xxxProcessKeyEvent+0x2da
ffff8083`9fd25090 fffff8bb`90f9f8b8 : 00000000`00000000 ffffdd88`6bbdaaf0 fffff880`80606a30 ffffa6fc`fb800000 : win32kbase!ProcessKeyboardInputWorker+0x837
ffff8083`9fd251f0 fffff8bb`90f9f739 : fffff8bb`91050770 ffff8083`9fd25301 00000000`00000000 ffffdd88`66068300 : win32kbase!CKeyboardProcessor::ForwardInputToKeyboardOverrider+0x6f8
ffff8083`9fd25220 fffff8bb`90fa808d : fffff880`806069e0 ffffdd88`5dc43070 00000000`0000000c 00000000`00000000 : win32kbase!CKeyboardProcessor::ForwardInputToKeyboardOverrider+0x579
ffff8083`9fd25360 fffff8bb`90fa13fa : fffff8bb`910054b0 ffff8083`9fd254a0 fffff880`806069e0 fffff8bb`91046a60 : win32kbase!xxxUnloadKeyboardLayout+0x9d
ffff8083`9fd253a0 fffff8bb`90e22609 : 00000000`00000040 fffff8bb`910054b0 00000000`00000001 00000000`00000000 : win32kbase!CBaseInput::FindDeviceInfo+0x99a
ffff8083`9fd254e0 fffff8bb`90e22212 : ffffdd88`69a235c0 fffff880`806580b0 00000000`00000006 ffff313b`2206480e : win32kbase!EtwTraceWakePump+0x839
ffff8083`9fd25620 fffff8bb`90e130fe : fffff8bb`9104d330 fffff880`806580b0 fffff8bb`91046a60 00000000`00000001 : win32kbase!EtwTraceWakePump+0x442
ffff8083`9fd25650 fffff8bb`90e12e50 : 00000000`00000006 fffff8bb`9104d330 00000000`00000001 fffff880`8462db00 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x3ae
ffff8083`9fd25680 fffff8bb`910ea50f : 00000000`00000010 00000000`00000001 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffff8083`9fd257b0 fffff8bb`90e79133 : ffffdd88`69a235c0 ffffdd88`69a235c0 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffff8083`9fd25970 fffff8bb`91180ce0 : ffffdd88`69a235c0 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8083`9fd25aa0 fffff8bb`91cf474d : ffffdd88`69a235c0 ffffdd88`69a235c0 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8083`9fd25ad0 fffff801`35408cb8 : ffffdd88`00000005 00000000`00000005 000001a4`e3c040e0 00000000`000027ac : win32k!NtUserCallNoParam+0x15
ffff8083`9fd25b00 00007ff8`fda010e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000099`a687ff18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`fda010e4
SYMBOL_NAME: win32kbase!RealGetProp+11
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr 0xffff80839fd23f70 ; kb
BUCKET_ID_FUNC_OFFSET: 11
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!RealGetProp
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {816ee291-fbc9-93de-c316-b6892e3ab43c}
Followup: MachineOwner