Question Can anyone let me know what this Complete Memory Dump reads when I get a blue screen?

Tennis987

Distinguished
Sep 9, 2015
126
3
18,695
Been having Issues with my Dell Precision 5540 laptop blue screening once a day while on VPN. Did a complete memory dump and opening it in WinDbg but don't know how to read it. I see that the issue is acsock64+549c which is VPN. I have Cisco AnyConnect 4.10 but i reinstalled VPN 3 times and I am still having issues. Bios Version 1.19. Cleared all old VPN files too. Not sure where to go from here. If there is any additional info you need let me know.

PROCESS_NAME: dnsserver.exe

STACK_TEXT:
ffff9681`bddbfe18 fffff800`21230f64 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`21afb320 : nt!KeBugCheckEx
ffff9681`bddbfe20 fffff800`21043343 : 00002394`ab869c91 ffff9681`bdda6180 00000000`00000000 ffff9681`bdda6180 : nt!KeAccumulateTicks+0x1eb3c4
ffff9681`bddbfe80 fffff800`21042e2a : ffffae0c`a2506600 ffffef09`36a36220 ffffef09`36a36800 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff9681`bddbff30 fffff800`210a7765 : ffffae0c`a2506600 fffff800`2114ea57 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9681`bddbff60 fffff800`211fedca : ffffef09`36a36220 ffffae0c`a2506600 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9681`bddbffb0 fffff800`211ff597 : 00000000`b01040ff fffff800`21016d22 ffffae0c`a1e02340 01800140`000000ff : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffef09`36a361a0 fffff800`2111577c : ffffef09`36a36438 fffff800`2101d929 00000000`00000000 00000000`00040246 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffef09`36a36330 fffff800`2101d9bc : ffffae0c`ef92a030 00000000`00000002 ffffae0c`f2a0f428 ffffae0c`e5d1cc10 : nt!KxWaitForSpinLockAndAcquire+0x2c
ffffef09`36a36360 fffff800`25664649 : ffffae0c`ef92a030 00000000`00000000 30313120`33203431 36313120`31303120 : nt!KeAcquireSpinLockAtDpcLevel+0x5c
ffffef09`36a36390 fffff800`25619ac7 : ffffef09`36a364b0 ffffef09`36a36d10 00000000`00000001 fffff800`2566461f : ndis!ndisAcquireReadLockPerCpuRefCnt+0x4d
ffffef09`36a363c0 fffff800`255fc93c : ffffae0c`ef92a020 ffffef09`36a36541 00000000`00000004 fffff800`25619ac7 : ndis!ndisAcquireReadWriteLockX+0x1d17f
ffffef09`36a363f0 fffff800`8cff549c : ffffae0c`00000000 fffff800`8cffe2d3 ffffef09`36a36508 fffff800`255fc93c : ndis!NdisAcquireReadWriteLock+0xc
ffffef09`36a36420 fffff800`8cff170b : ffffef09`36a36d10 fffff800`324e2110 ffffa282`070df72c fffff800`8cffe349 : acsock64+0x549c
ffffef09`36a36450 fffff800`8d00784d : ffffae0c`f2bc65d0 ffffef09`36a36541 00000000`00000000 fffff800`8cffe1e5 : acsock64+0x170b
ffffef09`36a36480 fffff800`8cffa5d4 : 00000000`00000070 ffffef09`36a36541 ffffef09`36a36d10 ffffae0c`f07cd000 : acsock64+0x1784d
ffffef09`36a364d0 fffff800`8cff497f : ffffae0c`f06c9840 00000000`00000000 ffffae0c`f06c9840 ffffef09`36a36d80 : acsock64+0xa5d4
ffffef09`36a36590 fffff800`2573c8cd : ffffae0c`f0616b80 ffffef09`36a36700 ffffef09`36a36860 ffffef09`36a36860 : acsock64+0x497f
ffffef09`36a36600 fffff800`2573962b : 00000000`0000003e ffffef09`36a36d10 ffffef09`36a36d80 00000000`00000000 : NETIO!ProcessCallout+0x86d
ffffef09`36a36780 fffff800`257381ca : ffffae0c`efaf4b30 ffffef09`36a36d10 00000000`00000000 ffffef09`36a36a90 : NETIO!ArbitrateAndEnforce+0x71b
ffffef09`36a368e0 fffff800`258e1c25 : 00000000`00000000 ffffef09`36a36de0 00000000`0000003e ffffae0d`0c3c8b70 : NETIO!KfdClassify+0x37a
ffffef09`36a36ce0 fffff800`25875dad : ffffae0c`e2d0e000 00000000`00000000 00000000`00000000 ffffae0c`efb707f0 : tcpip!AleNotifyEndpointTeardown+0x6b511
ffffef09`36a371b0 fffff800`25875429 : ffffef09`36a37600 ffffae0c`e4d8c2e0 00000000`00000000 ffffae0d`148846c0 : tcpip!UdpCloseEndpoint+0x975
ffffef09`36a374f0 fffff800`321d4864 : 00000000`00000102 ffffffff`ffffffff ffffef09`36a37548 00000000`00038318 : tcpip!UdpTlProviderCloseEndpoint+0x9
ffffef09`36a37520 fffff800`321b56c1 : ffffae0d`148846c0 00000000`00000000 00000000`00000001 fffff800`210f0a45 : afd!AfdTLCloseEndpoint+0x48
ffffef09`36a37560 fffff800`321d1824 : ffffae0d`148846c0 ffffae0d`148847d0 ffffae0d`148846c0 ffffef09`36a37678 : afd!AfdCloseTransportEndpoint+0x89
ffffef09`36a37640 fffff800`321d1c6c : ffffae0c`a4ba56b0 ffffae0d`148846c0 ffffae0c`e5961010 ffffae0c`a4ba56b0 : afd!AfdCleanupCore+0x3b8
ffffef09`36a37740 fffff800`21010665 : ffffae0c`efb6eab0 00000000`00000000 00000000`00000000 ffffae0c`e5961010 : afd!AfdDispatch+0xec
ffffef09`36a37780 fffff800`213feb17 : 00000000`00000000 ffffae0c`efb6eab0 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffef09`36a377c0 fffff800`21406b6f : ffffae0c`f44990c0 00000000`00000001 ffffc407`00000000 ffffae0c`efb6ea80 : nt!IopCloseFile+0x177
ffffef09`36a37850 fffff800`21401a5c : 00000000`000006ac ffffef09`36a37a80 00000000`00000000 ffffae0c`f63811c0 : nt!ObCloseHandleTableEntry+0x51f
ffffef09`36a37990 fffff800`212105f5 : ffffae0c`f45a2000 00000000`00000000 ffffef09`36a37a80 ffffae0c`00000000 : nt!NtClose+0xec
ffffef09`36a37a00 00007ffc`b634d034 : 00007ffc`b2ebce91 0000018b`a43a7650 00000000`000006ac 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000000b`055ffb78 00007ffc`b2ebce91 : 0000018b`a43a7650 00000000`000006ac 00000000`00000000 00000000`00000000 : ntdll!NtClose+0x14
0000000b`055ffb80 00007ffc`b2ebcc48 : 00000000`00000000 0000018b`a43a7650 000000c0`00321a10 000000c0`0004b298 : mswsock!SockCloseSocket+0x171
0000000b`055ffc40 00007ffc`b43c5101 : 000000c0`00321a10 00000000`0000058c 0000018b`fde9dee0 0000000b`055ffcd8 : mswsock!WSPCloseSocket+0x98
0000000b`055ffca0 00000000`00634fde : 000000c0`002d5380 00000000`00000000 00000000`00a897d0 00000000`0000025e : ws2_32!closesocket+0x101
0000000b`055ffcf0 000000c0`002d5380 : 00000000`00000000 00000000`00a897d0 00000000`0000025e 00000000`00000000 : dnsserver+0x64fde
0000000b`055ffcf8 00000000`00000000 : 00000000`00a897d0 00000000`0000025e 00000000`00000000 000000c0`00580800 : 0x000000c0`002d5380


SYMBOL_NAME: acsock64+549c

MODULE_NAME: acsock64

IMAGE_NAME: acsock64.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 549c

FAILURE_BUCKET_ID: 0x133_ISR_acsock64!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64
 
Update your post to include full system hardware specs and OS information.

Include PSU: make, model, wattage, age, condition (original to build, new, refurbished, used)?

Disk drives: make, model, capacity, how full?

Also look in Reliability History/Monitor and Event Viewer.

Either one or both tools may provide more information and details from just before or at the time of the blue screens.
 
Have you asked you IT department about this. The anyconnect software is part of cisco licensed vpn offering. It is very hard to get any support without a support contract. I do not know if you can download patches for the anyconnect client without a cisco account.

In addition cisco has end of life all the anyconnect software. What they really did was just rename is secure client when 5.0 came out. I have not read the details of what the last date really is you can get software updates or support from cisco. It was a year or two that I saw the announcement.

Hard to say it is a crash inside the vpn software itself and even if cisco had a way to look stuff up it is all locked behind a paywall.