KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80009424627, The address that the exception occurred at
Arg3: ffffa90af983db18, Parameter 0 of the exception
Arg4: ffffa90af983d320, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for adgnetworkwfpdrv.sys
PROCESS_NAME: System
STACK_TEXT:
ffffa90a`f983ca68 fffff800`75fab3df : 00000000`0000001e ffffffff`c0000005 fffff800`09424627 ffffa90a`f983db18 : nt!KeBugCheckEx
ffffa90a`f983ca70 fffff800`760bf1d6 : ffffa90a`f983d320 fffff800`75e2d0e8 ffffa90a`f983d0f0 fffff800`75d28244 : nt!KiFatalFilter+0x1f
ffffa90a`f983cab0 fffff800`75ef66cf : ffffa90a`00000002 ffffa90a`f983db18 ffffa90a`f9839000 ffffa90a`f983f000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffa90a`f983caf0 fffff800`760a8252 : ffffa90a`f983db18 ffffa90a`f983d0f0 00000000`00000000 00000000`00000000 : nt!_C_specific_handler+0x9f
ffffa90a`f983cb60 fffff800`75c7ad32 : 00000000`00000000 fffff800`75a00000 fffff800`75d28244 fffff800`75ae96e8 : nt!RtlpExecuteHandlerForException+0x12
ffffa90a`f983cb90 fffff800`75dc360f : ffffa90a`f983d320 ffffa90a`f983d820 ffffa90a`f983d320 ffffa90a`f983d9e0 : nt!RtlDispatchException+0x2d2
ffffa90a`f983d2f0 fffff800`760b2d45 : ffff8a09`5b631f02 ffff8a09`77b16538 00000000`00000000 ffff8a09`77b16538 : nt!KiDispatchException+0x35f
ffffa90a`f983d9e0 fffff800`760ade82 : ffff8a09`7147b530 ffffa90a`f983dfc8 00000000`00000000 fffff800`464461f4 : nt!KiExceptionDispatch+0x145
ffffa90a`f983dbc0 fffff800`09424627 : ffff8a09`7f2b9730 ffffa90a`f983df90 ffff8a09`6fdec9b0 fffff800`094126b4 : nt!KiPageFault+0x442
ffffa90a`f983dd50 fffff800`09423dab : ffff8a09`7a472a50 ffff8a09`7f29fa01 ffff8a09`6fdec9b0 ffff8a09`6fdec9b0 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x2db
ffffa90a`f983de50 fffff800`09422944 : ffffa90a`f983e7c0 ffffa90a`f983df90 00000000`00000000 fffff800`44a25701 : NETIO!StreamCalloutProcessingLoop+0x147
ffffa90a`f983df10 fffff800`09420cf1 : ffff8a09`5b1e0014 fffff800`4663dfe0 ffff8a09`00000002 ffff8a09`7728c300 : NETIO!StreamProcessCallout+0x2f4
ffffa90a`f983e040 fffff800`094505ef : 00000000`00000001 ffff8a09`7728c300 ffff8a09`5c63ab60 ffffa90a`f983e7c0 : NETIO!ProcessCallout+0x821
ffffa90a`f983e130 fffff800`0945369d : ffff8a09`7728c300 ffff8a09`5b1e8aa0 ffffa90a`f983e468 ffff8a09`63edd7e0 : NETIO!ArbitrateAndEnforce+0x5af
ffffa90a`f983e2a0 fffff800`75d28244 : 00000000`00000000 fffff800`09453650 00000000`00000000 ffffa90a`f983e801 : NETIO!ArbitrateAndEnforceCallout+0x4d
ffffa90a`f983e300 fffff800`75d2815d : fffff800`09453650 ffffa90a`f983e4f0 00000000`00000001 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xd4
ffffa90a`f983e370 fffff800`0943c1f6 : ffffa90a`f983e454 ffffa90a`f983e810 ffff8a09`5b1e7010 fffff800`09264cbf : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffa90a`f983e3b0 fffff800`0941a9d3 : 00000000`00000001 ffffa90a`f983e500 fffff800`09496000 00000000`0000000c : NETIO!NetioExpandKernelStackAndCallout+0x56
ffffa90a`f983e400 fffff800`0941a0c5 : ffff8a09`67270aa0 ffff8a09`67270aa0 00000000`00000000 fffff800`75cee9da : NETIO!KfdClassify+0x673
ffffa90a`f983e730 fffff800`0941999b : ffff8a09`5c63a9b0 00000000`00000000 00000000`00000014 ffff8a09`67270aa0 : NETIO!StreamInternalClassify+0x115
ffffa90a`f983e890 fffff800`0945239b : ffff8a09`7a472a50 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamInject+0x247
ffffa90a`f983e970 fffff800`098b26a7 : ffff8a09`7a472a50 00000000`00000000 ffff8a09`78dba5b0 ffff8a09`67270aa0 : NETIO!FwppStreamInject+0x28b
ffffa90a`f983ea10 fffff800`4644b4af : ffff8a09`5b084510 00000000`00000000 ffff8a09`744d0590 00000000`0000ec77 : fwpkclnt!FwpsStreamInjectAsync0+0x127
ffffa90a`f983eab0 ffff8a09`5b084510 : 00000000`00000000 ffff8a09`744d0590 00000000`0000ec77 00000000`00000139 : adgnetworkwfpdrv+0xb4af
ffffa90a`f983eab8 00000000`00000000 : ffff8a09`744d0590 00000000`0000ec77 00000000`00000139 fffff800`00000014 : 0xffff8a09`5b084510
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+2db
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.26100.7019
STACK_COMMAND: .process /r /p 0xffff8a0958562040; .thread 0xffff8a0970c4b380 ; kb
BUCKET_ID_FUNC_OFFSET: 2db
FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}
Followup: MachineOwner
---------
1: kd> !blackboxpnp
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 134088943575024382
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_05AC&PID_12A8\000081100004653E0A92601E
VetoString :