Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80f4b99c4b7, ffff900e0b7c5b50, 0}
Probably caused by : NETIO.SYS ( NETIO!ProcessCallout+882 )
Followup: MachineOwner
1: kd> !sym noisy
noisy mode - symbol prompts on
1: kd> kb
RetAddr : Args to Child : Call Site
00 fffff80721c7b7e9 : 00000000
0000003b 00000000c0000005 fffff80f
4b99c4b7 ffff900e`0b7c5b50 : nt!KeBugCheckEx
01 fffff80721c7ac3c : ffff900e
0b7c6308 ffff900e0b7c5b50 ffff900e
0b7c6308 00000000`00000000 : nt!KiBugCheckDispatch+0x69
02 fffff80721c72aef : fffff807
21f90000 fffff80721ab2000 0005b3b0
00a6a000 00000000`0010001f : nt!KiSystemServiceHandler+0x7c
03 fffff80721b14010 : ffff900e
0b7c59f0 0000000000000000 ffff900e
0b7c5910 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xf
04 fffff80721bb74d4 : ffff900e
0b7c6308 ffff900e0b7c6050 ffff900e
0b7c6308 ffff8001`cbed5010 : nt!RtlDispatchException+0x430
05 fffff80721c7b8c2 : 00000000
00000000 ffff900e0b7c63b0 00000000
00001000 00000000`00000050 : nt!KiDispatchException+0x144
06 fffff80721c77bae : ffff8001
c0db7978 e312422700000003 00000000
00001001 00000000`00000fff : nt!KiExceptionDispatch+0xc2
07 fffff80f4b99c4b7 : ffff900e
0b7c6784 0000000000000000 ffff8001
b76508a0 fffff80f`4ace5e39 : nt!KiPageFault+0x42e
08 fffff80f4ae49ed2 : 00000000
00000000 ffff8001cbed5010 00000000
00000177 00010010`00000001 : tcpip!AlePostProcessClassify+0x47
09 fffff80f4ae4c0d9 : 00000000
00000042 ffff8001cbed5010 ffff8001
cc97e2c8 ffff8001`c99f25c0 : NETIO!ProcessCallout+0x882
0a fffff80f4ae48971 : ffff8001
c12e2760 ffff8001cbed5010 00000000
00000000 ffff900e`0b7c6a80 : NETIO!ArbitrateAndEnforce+0xba9
0b fffff80f4b99c1d4 : ffff8001
b6802100 0000000000000000 fffff807
21ab2000 00000000`00000000 : NETIO!KfdClassify+0x561
0c fffff80f4ae8e0fd : 00013f62
0000aa71 fffff80f00000001 225a71bb
97e3e4ea ffffc600`4b8e6430 : tcpip!AleInspectConnectRequestComplete+0x134
0d fffff80f4b3d6200 : ffff8001
cb2b89a0 ffff900e0b7c7060 ffff8001
cb2b89a0 ffff8001`bf61e020 : NETIO!FeCompleteClassify+0x19d
0e fffff8072b90f716 : 00000000
00000000 fffff8072b916410 ffff900e
00000000 ffffc600`4cec7000 : fwpkclnt!FwpsCompleteClassify0+0x10
0f fffff8072b9098e7 : ffff8001
cb2b89a0 0000000000000001 ffffe9f4
fa7d3000 ffffe980`00000000 : MyDriver!tcpctx_purgeRedirectInfo+0x46
10 fffff8072b90916f : ffff8001
c418e6a0 ffff900e0b7c7060 ffffc600
4cec7000 00000000`00000001 : MyDriver!devctrl_processTcpConnect+0x207
11 fffff8072b9071de : 00000000
00000008 fffff80700000000 00000000
00000000 00000000`00000000 : MyDriver!devctrl_processRequest+0x6f
12 (Inline Function) : ---------------- --------
-------- ---------------- --------
-------- : MyDriver!devctrl_write+0x46
13 fffff80721b2cd79 : ffff8001
be61eea0 ffff8001c0e3ec50 00000000
00000000 ffff8001`c0e73080 : MyDriver!devctrl_dispatch+0x63e
14 fffff807220d2971 : ffff8001
be61eea0 0000000000000000 00000000
00000000 ffff8001`c0e3ec50 : nt!IofCallDriver+0x59
15 fffff807220653ed : ffff900e
0b7c7440 ffff8001be61eea0 ffff900e
0b7c7400 ffff900e`0b7c7440 : nt!IopSynchronousServiceTail+0x1b1
16 fffff80721c7b205 : 00000000
00000600 0000000000000784 00000000
00000001 00000000`04c5fbd4 : nt!NtWriteFile+0x8bd
17 0000000076e81cbc : 00000000
00000000 0000000000000000 00000000
00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
18 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x76e81cbc 1: kd> r rax=ffff900e0b7c5320 rbx=ffff900e0b7c73c0 rcx=000000000000003b rdx=00000000c0000005 rsi=ffff900e0b7c59f0 rdi=0000000000000000 rip=fffff80721c69fe0 rsp=ffff900e0b7c5218 rbp=ffff900e0b7c5910 r8=fffff80f4b99c4b7 r9=ffff900e0b7c5b50 r10=0000000000000000 r11=0000000021ab2000 r12=fffff80721c7b205 r13=ffff900e0b7c5410 r14=0000000000000000 r15=ffff900e0b7c6308 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282 nt!KeBugCheckEx: fffff807
21c69fe0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff900e`0b7c5220=000000000000003b