Blue screen of death (BSOD)

  • Thread starter Thread starter Plebtkp
  • Start date Start date
P

Plebtkp

Guest
Hi,


I recently been getting random BSODs, it seems to be at random times. I'm not sure what could be causing it.

Note: Drivers are up to date and I have run some memory test which all pass.


Here is the memory dump file.


Any help would be greatly appreciated.



Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.





************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 19041 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 19041.1.amd64fre.vb_release.191206-1406

Machine Name:

Kernel base = 0xfffff801`37200000 PsLoadedModuleList = 0xfffff801`37e2a490

Debug session time: Mon Apr 12 14:41:04.007 2021 (UTC - 5:00)

System Uptime: 2 days 16:15:53.522

Loading Kernel Symbols

...............................................................

..............Page 40641f not present in the dump file. Type ".hh dbgerr004" for details

..................................................

..................................Page 411802 not present in the dump file. Type ".hh dbgerr004" for details

.Page 183dd2 not present in the dump file. Type ".hh dbgerr004" for details

.............................

........................

Loading User Symbols

PEB is paged out (Peb.Ldr = 000000bb`15c5b018). Type ".hh dbgerr001" for details

Loading unloaded module list

....................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff801`375f5db0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9f80`36574020=000000000000003b

11: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the bugcheck

Arg2: fffff80136257e13, Address of the instruction which caused the bugcheck

Arg3: ffff9f8036574920, Address of the context record for the exception that caused the bugcheck

Arg4: 0000000000000000, zero.



Debugging Details:

------------------



Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details

Page 24131 not present in the dump file. Type ".hh dbgerr004" for details



KEY_VALUES_STRING: 1



Key : Analysis.CPU.mSec

Value: 3515



Key : Analysis.DebugAnalysisManager

Value: Create



Key : Analysis.Elapsed.mSec

Value: 6086



Key : Analysis.Init.CPU.mSec

Value: 1046



Key : Analysis.Init.Elapsed.mSec

Value: 41459



Key : Analysis.Memory.CommitPeak.Mb

Value: 85



Key : WER.OS.Branch

Value: vb_release



Key : WER.OS.Timestamp

Value: 2019-12-06T14:06:00Z



Key : WER.OS.Version

Value: 10.0.19041.1





BUGCHECK_CODE: 3b



BUGCHECK_P1: c0000005



BUGCHECK_P2: fffff80136257e13



BUGCHECK_P3: ffff9f8036574920



BUGCHECK_P4: 0



CONTEXT: ffff9f8036574920 -- (.cxr 0xffff9f8036574920)

rax=ffffc706ed0a9600 rbx=ffffc706ed0a95f8 rcx=ffffc706f44fae30

rdx=ffffee8aa61a84e0 rsi=ffffc706ed0a9600 rdi=ffffc705f2ef72e0

rip=fffff80136257e13 rsp=ffffee8aa61a8490 rbp=000000000dca2cab

r8=ffffc705f2ef72e0 r9=ffffc705f2ef72e0 r10=ffffc706ed0a9600

r11=00000000000003fe r12=ffffee8aa61a892c r13=ffffc706efc13990

r14=fffff80136288a01 r15=ffffee8aa61a8970

iopl=0 nv up ei ng nz na pe nc

cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282

acsock64+0x7e13:

fffff801`36257e13 49894008 mov qword ptr [r8+8],rax ds:002b:ffffc705`f2ef72e8=????????????????

Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



PROCESS_NAME: DriverUpdSvc.exe



STACK_TEXT:

ffffee8a`a61a8490 fffff801`36257ce1 : 00000000`00000004 ffffc706`ed0a9650 ffffc706`eb0ce010 fffff801`3b97c6fc : acsock64+0x7e13

ffffee8a`a61a84c0 fffff801`36257376 : ffffc706`ed0a95f0 ffffee8a`a61a8550 00000000`00000004 00000000`0dca2cab : acsock64+0x7ce1

ffffee8a`a61a8510 fffff801`3625dc0f : ffffc706`f44e3ae0 ffffc706`f44e3ae0 ffffc706`eb0ce010 ffffc706`ed0a3020 : acsock64+0x7376

ffffee8a`a61a8560 fffff801`36266515 : 00000000`00000000 00000000`00000040 00000000`00000000 fffff801`3625e139 : acsock64+0xdc0f

ffffee8a`a61a8590 fffff801`3625a2c2 : ffffc706`ed0a9090 ffffee8a`a61a8651 00000000`00008000 ffffee8a`a61a8e10 : acsock64+0x16515

ffffee8a`a61a85e0 fffff801`36254a1d : 00000000`00000000 7250202c`3334343a ffffc706`edf0dd50 00000000`00000004 : acsock64+0xa2c2

ffffee8a`a61a86a0 fffff801`3badfb3f : ffffc706`dbf0a480 ffffee8a`a61a8810 ffffee8a`a61a8e80 00000000`00000000 : acsock64+0x4a1d

ffffee8a`a61a8710 fffff801`3bab95eb : 00000000`0000003e ffffee8a`a61a8e10 ffffee8a`a61a8e80 00000000`00000000 : NETIO!ProcessCallout+0x236bf

ffffee8a`a61a8890 fffff801`3bab818a : ffffc706`e8e5b680 ffffee8a`a61a8e10 00000000`00000000 ffffee8a`a61a8b90 : NETIO!ArbitrateAndEnforce+0x71b

ffffee8a`a61a89f0 fffff801`3bfad624 : 00000000`00000000 ffffee8a`a61a8ee0 00000000`0000003e ffffc706`e6e79010 : NETIO!KfdClassify+0x37a

ffffee8a`a61a8de0 fffff801`3bf3ddd6 : ffffc706`df9c0000 00000000`00000000 ffffc706`e6e79010 ffffc706`dbf22050 : tcpip!AleNotifyEndpointTeardown+0x6eadc

ffffee8a`a61a92a0 fffff801`3bf3d8a7 : ffffc706`d977a010 ffffc706`ecefb5a0 ffffc706`d977a010 ffffc706`d977a080 : tcpip!TcpCleanupEndpointWorkQueueRoutine+0x4d6

ffffee8a`a61a93a0 fffff801`3bf3d5f8 : 00000000`00000000 ffffc706`d977a010 00000000`00000000 ffffee8a`a61a94e0 : tcpip!TcpCloseEndpointWorkQueueRoutine+0x267

ffffee8a`a61a9460 fffff801`3d2626a3 : ffffc706`f42d6e70 ffffc706`dfcf2600 ffffee8a`a61a9579 00000000`00000000 : tcpip!TcpTlEndpointCloseEndpoint+0xb8

ffffee8a`a61a94c0 fffff801`3d242dc1 : ffffc706`edfa50e0 00000000`00000000 ffffee8a`a61a9679 00000000`00000000 : afd!AfdTLCloseEndpoint+0x47

ffffee8a`a61a9500 fffff801`3d25f824 : ffffc706`edfa50e0 ffffc706`edfa51f0 ffffc706`edfa50e0 00000000`00000000 : afd!AfdCloseTransportEndpoint+0x89

ffffee8a`a61a95e0 fffff801`3d25fc6c : ffffee8a`a61aa000 ffffc706`edfa50e0 ffffc706`eb0f6c90 ffffc706`e2152970 : afd!AfdCleanupCore+0x3b8

ffffee8a`a61a96e0 fffff801`37452f55 : ffffc706`eb3dd400 ffffee8a`a61a97d9 00000000`00000000 ffffc706`eb0f6c90 : afd!AfdDispatch+0xec

ffffee8a`a61a9720 fffff801`3df64b5b : 00000000`00000000 fffff801`37408338 ffffee8a`a61a9958 ffffc706`d99ce510 : nt!IofCallDriver+0x55

ffffee8a`a61a9760 fffff801`37452f55 : ffffc706`eb3dd2b0 ffffc706`eb0f6c90 ffffc706`f2899e50 00000000`00989680 : avgArPot+0x14b5b

ffffee8a`a61a9840 fffff801`377fdd7a : 00000000`00000000 ffffc706`f2899e50 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55

ffffee8a`a61a9880 fffff801`37828d1c : 00000000`00000000 00000000`00007ffb ffffffff`00000000 ffffc706`d96f7ae0 : nt!IopCloseFile+0x17a

ffffee8a`a61a9910 fffff801`3782c9ec : 00000000`00001658 ffffa228`7f5ad67a 00000000`00000000 fffff801`37607ccc : nt!ObCloseHandleTableEntry+0x24c

ffffee8a`a61a9a50 fffff801`37607cf1 : ffffc706`e9958000 00000000`000493e0 ffffee8a`a61a9b40 00000000`000017d8 : nt!NtClose+0xec

ffffee8a`a61a9ac0 00007fff`bde2cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc

000000bb`172feac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`bde2cdf4





SYMBOL_NAME: acsock64+7e13



MODULE_NAME: acsock64



IMAGE_NAME: acsock64.sys



STACK_COMMAND: .cxr 0xffff9f8036574920 ; kb



BUCKET_ID_FUNC_OFFSET: 7e13



FAILURE_BUCKET_ID: 0x3B_c0000005_acsock64!unknown_function



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {b95b79e4-d57b-474e-df13-29c19edd0bd4}



Followup: MachineOwner

---------



11: kd> !blackboxbsd

Stream size mismatch (expected = 192, read = 176)

11: kd> .cxr 0xffff9f8036574920

rax=ffffc706ed0a9600 rbx=ffffc706ed0a95f8 rcx=ffffc706f44fae30

rdx=ffffee8aa61a84e0 rsi=ffffc706ed0a9600 rdi=ffffc705f2ef72e0

rip=fffff80136257e13 rsp=ffffee8aa61a8490 rbp=000000000dca2cab

r8=ffffc705f2ef72e0 r9=ffffc705f2ef72e0 r10=ffffc706ed0a9600

r11=00000000000003fe r12=ffffee8aa61a892c r13=ffffc706efc13990

r14=fffff80136288a01 r15=ffffee8aa61a8970

iopl=0 nv up ei ng nz na pe nc

cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282

acsock64+0x7e13:

fffff801`36257e13 49894008 mov qword ptr [r8+8],rax ds:002b:ffffc705`f2ef72e8=????????????????

11: kd> !blackboxbsd

Stream size mismatch (expected = 192, read = 176)

Continue reading...
 
Back
Top