P
Plebtkp
Hi,
I recently been getting random BSODs, it seems to be at random times. I'm not sure what could be causing it.
Note: Drivers are up to date and I have run some memory test which all pass.
Here is the memory dump file.
Any help would be greatly appreciated.
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`37200000 PsLoadedModuleList = 0xfffff801`37e2a490
Debug session time: Mon Apr 12 14:41:04.007 2021 (UTC - 5:00)
System Uptime: 2 days 16:15:53.522
Loading Kernel Symbols
...............................................................
..............Page 40641f not present in the dump file. Type ".hh dbgerr004" for details
..................................................
..................................Page 411802 not present in the dump file. Type ".hh dbgerr004" for details
.Page 183dd2 not present in the dump file. Type ".hh dbgerr004" for details
.............................
........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000bb`15c5b018). Type ".hh dbgerr001" for details
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`375f5db0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9f80`36574020=000000000000003b
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80136257e13, Address of the instruction which caused the bugcheck
Arg3: ffff9f8036574920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3515
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6086
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 41459
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80136257e13
BUGCHECK_P3: ffff9f8036574920
BUGCHECK_P4: 0
CONTEXT: ffff9f8036574920 -- (.cxr 0xffff9f8036574920)
rax=ffffc706ed0a9600 rbx=ffffc706ed0a95f8 rcx=ffffc706f44fae30
rdx=ffffee8aa61a84e0 rsi=ffffc706ed0a9600 rdi=ffffc705f2ef72e0
rip=fffff80136257e13 rsp=ffffee8aa61a8490 rbp=000000000dca2cab
r8=ffffc705f2ef72e0 r9=ffffc705f2ef72e0 r10=ffffc706ed0a9600
r11=00000000000003fe r12=ffffee8aa61a892c r13=ffffc706efc13990
r14=fffff80136288a01 r15=ffffee8aa61a8970
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
acsock64+0x7e13:
fffff801`36257e13 49894008 mov qword ptr [r8+8],rax ds:002b:ffffc705`f2ef72e8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: DriverUpdSvc.exe
STACK_TEXT:
ffffee8a`a61a8490 fffff801`36257ce1 : 00000000`00000004 ffffc706`ed0a9650 ffffc706`eb0ce010 fffff801`3b97c6fc : acsock64+0x7e13
ffffee8a`a61a84c0 fffff801`36257376 : ffffc706`ed0a95f0 ffffee8a`a61a8550 00000000`00000004 00000000`0dca2cab : acsock64+0x7ce1
ffffee8a`a61a8510 fffff801`3625dc0f : ffffc706`f44e3ae0 ffffc706`f44e3ae0 ffffc706`eb0ce010 ffffc706`ed0a3020 : acsock64+0x7376
ffffee8a`a61a8560 fffff801`36266515 : 00000000`00000000 00000000`00000040 00000000`00000000 fffff801`3625e139 : acsock64+0xdc0f
ffffee8a`a61a8590 fffff801`3625a2c2 : ffffc706`ed0a9090 ffffee8a`a61a8651 00000000`00008000 ffffee8a`a61a8e10 : acsock64+0x16515
ffffee8a`a61a85e0 fffff801`36254a1d : 00000000`00000000 7250202c`3334343a ffffc706`edf0dd50 00000000`00000004 : acsock64+0xa2c2
ffffee8a`a61a86a0 fffff801`3badfb3f : ffffc706`dbf0a480 ffffee8a`a61a8810 ffffee8a`a61a8e80 00000000`00000000 : acsock64+0x4a1d
ffffee8a`a61a8710 fffff801`3bab95eb : 00000000`0000003e ffffee8a`a61a8e10 ffffee8a`a61a8e80 00000000`00000000 : NETIO!ProcessCallout+0x236bf
ffffee8a`a61a8890 fffff801`3bab818a : ffffc706`e8e5b680 ffffee8a`a61a8e10 00000000`00000000 ffffee8a`a61a8b90 : NETIO!ArbitrateAndEnforce+0x71b
ffffee8a`a61a89f0 fffff801`3bfad624 : 00000000`00000000 ffffee8a`a61a8ee0 00000000`0000003e ffffc706`e6e79010 : NETIO!KfdClassify+0x37a
ffffee8a`a61a8de0 fffff801`3bf3ddd6 : ffffc706`df9c0000 00000000`00000000 ffffc706`e6e79010 ffffc706`dbf22050 : tcpip!AleNotifyEndpointTeardown+0x6eadc
ffffee8a`a61a92a0 fffff801`3bf3d8a7 : ffffc706`d977a010 ffffc706`ecefb5a0 ffffc706`d977a010 ffffc706`d977a080 : tcpip!TcpCleanupEndpointWorkQueueRoutine+0x4d6
ffffee8a`a61a93a0 fffff801`3bf3d5f8 : 00000000`00000000 ffffc706`d977a010 00000000`00000000 ffffee8a`a61a94e0 : tcpip!TcpCloseEndpointWorkQueueRoutine+0x267
ffffee8a`a61a9460 fffff801`3d2626a3 : ffffc706`f42d6e70 ffffc706`dfcf2600 ffffee8a`a61a9579 00000000`00000000 : tcpip!TcpTlEndpointCloseEndpoint+0xb8
ffffee8a`a61a94c0 fffff801`3d242dc1 : ffffc706`edfa50e0 00000000`00000000 ffffee8a`a61a9679 00000000`00000000 : afd!AfdTLCloseEndpoint+0x47
ffffee8a`a61a9500 fffff801`3d25f824 : ffffc706`edfa50e0 ffffc706`edfa51f0 ffffc706`edfa50e0 00000000`00000000 : afd!AfdCloseTransportEndpoint+0x89
ffffee8a`a61a95e0 fffff801`3d25fc6c : ffffee8a`a61aa000 ffffc706`edfa50e0 ffffc706`eb0f6c90 ffffc706`e2152970 : afd!AfdCleanupCore+0x3b8
ffffee8a`a61a96e0 fffff801`37452f55 : ffffc706`eb3dd400 ffffee8a`a61a97d9 00000000`00000000 ffffc706`eb0f6c90 : afd!AfdDispatch+0xec
ffffee8a`a61a9720 fffff801`3df64b5b : 00000000`00000000 fffff801`37408338 ffffee8a`a61a9958 ffffc706`d99ce510 : nt!IofCallDriver+0x55
ffffee8a`a61a9760 fffff801`37452f55 : ffffc706`eb3dd2b0 ffffc706`eb0f6c90 ffffc706`f2899e50 00000000`00989680 : avgArPot+0x14b5b
ffffee8a`a61a9840 fffff801`377fdd7a : 00000000`00000000 ffffc706`f2899e50 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee8a`a61a9880 fffff801`37828d1c : 00000000`00000000 00000000`00007ffb ffffffff`00000000 ffffc706`d96f7ae0 : nt!IopCloseFile+0x17a
ffffee8a`a61a9910 fffff801`3782c9ec : 00000000`00001658 ffffa228`7f5ad67a 00000000`00000000 fffff801`37607ccc : nt!ObCloseHandleTableEntry+0x24c
ffffee8a`a61a9a50 fffff801`37607cf1 : ffffc706`e9958000 00000000`000493e0 ffffee8a`a61a9b40 00000000`000017d8 : nt!NtClose+0xec
ffffee8a`a61a9ac0 00007fff`bde2cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000bb`172feac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`bde2cdf4
SYMBOL_NAME: acsock64+7e13
MODULE_NAME: acsock64
IMAGE_NAME: acsock64.sys
STACK_COMMAND: .cxr 0xffff9f8036574920 ; kb
BUCKET_ID_FUNC_OFFSET: 7e13
FAILURE_BUCKET_ID: 0x3B_c0000005_acsock64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b95b79e4-d57b-474e-df13-29c19edd0bd4}
Followup: MachineOwner
---------
11: kd> !blackboxbsd
Stream size mismatch (expected = 192, read = 176)
11: kd> .cxr 0xffff9f8036574920
rax=ffffc706ed0a9600 rbx=ffffc706ed0a95f8 rcx=ffffc706f44fae30
rdx=ffffee8aa61a84e0 rsi=ffffc706ed0a9600 rdi=ffffc705f2ef72e0
rip=fffff80136257e13 rsp=ffffee8aa61a8490 rbp=000000000dca2cab
r8=ffffc705f2ef72e0 r9=ffffc705f2ef72e0 r10=ffffc706ed0a9600
r11=00000000000003fe r12=ffffee8aa61a892c r13=ffffc706efc13990
r14=fffff80136288a01 r15=ffffee8aa61a8970
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
acsock64+0x7e13:
fffff801`36257e13 49894008 mov qword ptr [r8+8],rax ds:002b:ffffc705`f2ef72e8=????????????????
11: kd> !blackboxbsd
Stream size mismatch (expected = 192, read = 176)
Continue reading...
I recently been getting random BSODs, it seems to be at random times. I'm not sure what could be causing it.
Note: Drivers are up to date and I have run some memory test which all pass.
Here is the memory dump file.
Any help would be greatly appreciated.
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`37200000 PsLoadedModuleList = 0xfffff801`37e2a490
Debug session time: Mon Apr 12 14:41:04.007 2021 (UTC - 5:00)
System Uptime: 2 days 16:15:53.522
Loading Kernel Symbols
...............................................................
..............Page 40641f not present in the dump file. Type ".hh dbgerr004" for details
..................................................
..................................Page 411802 not present in the dump file. Type ".hh dbgerr004" for details
.Page 183dd2 not present in the dump file. Type ".hh dbgerr004" for details
.............................
........................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000bb`15c5b018). Type ".hh dbgerr001" for details
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`375f5db0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9f80`36574020=000000000000003b
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80136257e13, Address of the instruction which caused the bugcheck
Arg3: ffff9f8036574920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
Page 24131 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3515
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6086
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 41459
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80136257e13
BUGCHECK_P3: ffff9f8036574920
BUGCHECK_P4: 0
CONTEXT: ffff9f8036574920 -- (.cxr 0xffff9f8036574920)
rax=ffffc706ed0a9600 rbx=ffffc706ed0a95f8 rcx=ffffc706f44fae30
rdx=ffffee8aa61a84e0 rsi=ffffc706ed0a9600 rdi=ffffc705f2ef72e0
rip=fffff80136257e13 rsp=ffffee8aa61a8490 rbp=000000000dca2cab
r8=ffffc705f2ef72e0 r9=ffffc705f2ef72e0 r10=ffffc706ed0a9600
r11=00000000000003fe r12=ffffee8aa61a892c r13=ffffc706efc13990
r14=fffff80136288a01 r15=ffffee8aa61a8970
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
acsock64+0x7e13:
fffff801`36257e13 49894008 mov qword ptr [r8+8],rax ds:002b:ffffc705`f2ef72e8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: DriverUpdSvc.exe
STACK_TEXT:
ffffee8a`a61a8490 fffff801`36257ce1 : 00000000`00000004 ffffc706`ed0a9650 ffffc706`eb0ce010 fffff801`3b97c6fc : acsock64+0x7e13
ffffee8a`a61a84c0 fffff801`36257376 : ffffc706`ed0a95f0 ffffee8a`a61a8550 00000000`00000004 00000000`0dca2cab : acsock64+0x7ce1
ffffee8a`a61a8510 fffff801`3625dc0f : ffffc706`f44e3ae0 ffffc706`f44e3ae0 ffffc706`eb0ce010 ffffc706`ed0a3020 : acsock64+0x7376
ffffee8a`a61a8560 fffff801`36266515 : 00000000`00000000 00000000`00000040 00000000`00000000 fffff801`3625e139 : acsock64+0xdc0f
ffffee8a`a61a8590 fffff801`3625a2c2 : ffffc706`ed0a9090 ffffee8a`a61a8651 00000000`00008000 ffffee8a`a61a8e10 : acsock64+0x16515
ffffee8a`a61a85e0 fffff801`36254a1d : 00000000`00000000 7250202c`3334343a ffffc706`edf0dd50 00000000`00000004 : acsock64+0xa2c2
ffffee8a`a61a86a0 fffff801`3badfb3f : ffffc706`dbf0a480 ffffee8a`a61a8810 ffffee8a`a61a8e80 00000000`00000000 : acsock64+0x4a1d
ffffee8a`a61a8710 fffff801`3bab95eb : 00000000`0000003e ffffee8a`a61a8e10 ffffee8a`a61a8e80 00000000`00000000 : NETIO!ProcessCallout+0x236bf
ffffee8a`a61a8890 fffff801`3bab818a : ffffc706`e8e5b680 ffffee8a`a61a8e10 00000000`00000000 ffffee8a`a61a8b90 : NETIO!ArbitrateAndEnforce+0x71b
ffffee8a`a61a89f0 fffff801`3bfad624 : 00000000`00000000 ffffee8a`a61a8ee0 00000000`0000003e ffffc706`e6e79010 : NETIO!KfdClassify+0x37a
ffffee8a`a61a8de0 fffff801`3bf3ddd6 : ffffc706`df9c0000 00000000`00000000 ffffc706`e6e79010 ffffc706`dbf22050 : tcpip!AleNotifyEndpointTeardown+0x6eadc
ffffee8a`a61a92a0 fffff801`3bf3d8a7 : ffffc706`d977a010 ffffc706`ecefb5a0 ffffc706`d977a010 ffffc706`d977a080 : tcpip!TcpCleanupEndpointWorkQueueRoutine+0x4d6
ffffee8a`a61a93a0 fffff801`3bf3d5f8 : 00000000`00000000 ffffc706`d977a010 00000000`00000000 ffffee8a`a61a94e0 : tcpip!TcpCloseEndpointWorkQueueRoutine+0x267
ffffee8a`a61a9460 fffff801`3d2626a3 : ffffc706`f42d6e70 ffffc706`dfcf2600 ffffee8a`a61a9579 00000000`00000000 : tcpip!TcpTlEndpointCloseEndpoint+0xb8
ffffee8a`a61a94c0 fffff801`3d242dc1 : ffffc706`edfa50e0 00000000`00000000 ffffee8a`a61a9679 00000000`00000000 : afd!AfdTLCloseEndpoint+0x47
ffffee8a`a61a9500 fffff801`3d25f824 : ffffc706`edfa50e0 ffffc706`edfa51f0 ffffc706`edfa50e0 00000000`00000000 : afd!AfdCloseTransportEndpoint+0x89
ffffee8a`a61a95e0 fffff801`3d25fc6c : ffffee8a`a61aa000 ffffc706`edfa50e0 ffffc706`eb0f6c90 ffffc706`e2152970 : afd!AfdCleanupCore+0x3b8
ffffee8a`a61a96e0 fffff801`37452f55 : ffffc706`eb3dd400 ffffee8a`a61a97d9 00000000`00000000 ffffc706`eb0f6c90 : afd!AfdDispatch+0xec
ffffee8a`a61a9720 fffff801`3df64b5b : 00000000`00000000 fffff801`37408338 ffffee8a`a61a9958 ffffc706`d99ce510 : nt!IofCallDriver+0x55
ffffee8a`a61a9760 fffff801`37452f55 : ffffc706`eb3dd2b0 ffffc706`eb0f6c90 ffffc706`f2899e50 00000000`00989680 : avgArPot+0x14b5b
ffffee8a`a61a9840 fffff801`377fdd7a : 00000000`00000000 ffffc706`f2899e50 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee8a`a61a9880 fffff801`37828d1c : 00000000`00000000 00000000`00007ffb ffffffff`00000000 ffffc706`d96f7ae0 : nt!IopCloseFile+0x17a
ffffee8a`a61a9910 fffff801`3782c9ec : 00000000`00001658 ffffa228`7f5ad67a 00000000`00000000 fffff801`37607ccc : nt!ObCloseHandleTableEntry+0x24c
ffffee8a`a61a9a50 fffff801`37607cf1 : ffffc706`e9958000 00000000`000493e0 ffffee8a`a61a9b40 00000000`000017d8 : nt!NtClose+0xec
ffffee8a`a61a9ac0 00007fff`bde2cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000bb`172feac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`bde2cdf4
SYMBOL_NAME: acsock64+7e13
MODULE_NAME: acsock64
IMAGE_NAME: acsock64.sys
STACK_COMMAND: .cxr 0xffff9f8036574920 ; kb
BUCKET_ID_FUNC_OFFSET: 7e13
FAILURE_BUCKET_ID: 0x3B_c0000005_acsock64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b95b79e4-d57b-474e-df13-29c19edd0bd4}
Followup: MachineOwner
---------
11: kd> !blackboxbsd
Stream size mismatch (expected = 192, read = 176)
11: kd> .cxr 0xffff9f8036574920
rax=ffffc706ed0a9600 rbx=ffffc706ed0a95f8 rcx=ffffc706f44fae30
rdx=ffffee8aa61a84e0 rsi=ffffc706ed0a9600 rdi=ffffc705f2ef72e0
rip=fffff80136257e13 rsp=ffffee8aa61a8490 rbp=000000000dca2cab
r8=ffffc705f2ef72e0 r9=ffffc705f2ef72e0 r10=ffffc706ed0a9600
r11=00000000000003fe r12=ffffee8aa61a892c r13=ffffc706efc13990
r14=fffff80136288a01 r15=ffffee8aa61a8970
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
acsock64+0x7e13:
fffff801`36257e13 49894008 mov qword ptr [r8+8],rax ds:002b:ffffc705`f2ef72e8=????????????????
11: kd> !blackboxbsd
Stream size mismatch (expected = 192, read = 176)
Continue reading...