Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\yenit\AppData\Local\Temp\Rar$DIa5116.33643\112420-5968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`59000000 PsLoadedModuleList = 0xfffff803`59c2a3b0
Debug session time: Tue Nov 24 11:33:03.499 2020 (UTC + 3:00)
System Uptime: 1 days 19:16:30.194
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`593f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9e08`830ac9a0=000000000000003b
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff9d5b688f3d49, Address of the instruction which caused the bugcheck
Arg3: ffff9e08830ad2a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on FUKO
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5892
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffff9d5b688f3d49
BUGCHECK_P3: ffff9e08830ad2a0
BUGCHECK_P4: 0
CONTEXT: ffff9e08830ad2a0 -- (.cxr 0xffff9e08830ad2a0)
rax=0000000000000003 rbx=ffff9d24c6317090 rcx=ffff9d24c63170ac
rdx=000000000514c9c0 rsi=0000000000000000 rdi=ffff9d24c0911000
rip=ffff9d5b688f3d49 rsp=ffff9e08830adca0 rbp=ffff9e08830ae310
r8=0000000000000000 r9=0000000000000003 r10=0000000000000000
r11=0000000000000001 r12=ffff9e08830ae8f0 r13=ffff9d24c44162c0
r14=0000000000000001 r15=ffff9e08830ae8d8
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull!EngStretchBltNew+0xe3d:
ffff9d5b`688f3d49 0000 add byte ptr [rax],al ds:002b:00000000`00000003=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
MISALIGNED_IP:
win32kfull!EngStretchBltNew+e3d
ffff9d5b`688f3d49 0000 add byte ptr [rax],al
STACK_TEXT:
ffff9e08`830adca0 ffff9d5b`688f2ee4 : ffff9d24`00000000 ffff9d24`c44162d8 ffff9d5b`689c45b0 ffff9e08`830ae8f8 : win32kfull!EngStretchBltNew+0xe3d
ffff9e08`830ae210 ffff9d5b`6891fa33 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!EngStretchBlt+0xd4
ffff9e08`830ae370 ffff9d5b`68924bf2 : 00000000`0000ff00 fffff803`5927582a ffff9e08`830ae8d8 ffff9d24`c0911000 : win32kfull!EngStretchBltROP+0x143
ffff9e08`830ae4f0 ffff9d5b`68922cdf : ffff9e08`830ae7a0 00000000`00000000 00000000`00000000 ffff9d24`c6107ab0 : win32kfull!BLTRECORD::bStretch+0x37e
ffff9e08`830ae6a0 ffff9d5b`689df918 : 00000000`0085000f ffff9d24`c0911000 ffff9d24`c46c6a00 00000000`00000000 : win32kfull!GreStretchBltInternal+0x6d3
ffff9e08`830ae990 ffff9d5b`6946d2c8 : 000024b1`00000001 ffff9d5b`68646d36 ffff9d24`c0a09f00 000024b1`00000001 : win32kfull!NtGdiStretchBlt+0x68
ffff9e08`830aea10 fffff803`59406bb8 : ffff9e08`830aeb80 ffff9d5b`689d83d6 00000000`00000000 00000000`110506a0 : win32k!NtGdiStretchBlt+0x80
ffff9e08`830aea90 00007ffd`75f11664 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`004bebf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`75f11664
SYMBOL_NAME: win32kfull!EngStretchBltNew+e3d
MODULE_NAME: hardware
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.631
STACK_COMMAND: .cxr 0xffff9e08830ad2a0 ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_win32kfull.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a4dbea1d-84d7-234f-0297-2512e5417445}
Followup: MachineOwner
---------
8: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2265]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 4.A0
BiosReleaseDate = 06/15/2020
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 2.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M PRO-M2 V2 (MS-7B84)
BaseBoardVersion = 2.0