The DRIVER_IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x000000D1. This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
Code:
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\michal01\Downloads\MEMORY (3).DMP]
Kernel Bitmap Dump File: Full address space is available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*
Symbol search path is: SRV*
Executable search path is:
Windows 10 Kernel Version 17763 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff807`2b019000 PsLoadedModuleList = 0xfffff807`2b4345d0
Debug session time: Fri Jun 7 14:02:55.954 2019 (UTC + 2:00)
System Uptime: 1 days 8:45:59.117
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....................
Loading User Symbols
................................................................
............................
Loading unloaded module list
..........................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffffa90022f28130, 2, 1, fffff80780e66465}
*** ERROR: Module load completed but symbols could not be loaded for RfeCo10X64.sys
*** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
*** ERROR: Symbol file could not be found. Defaulted to export symbols for chrome_child.dll -
Probably caused by : RfeCo10X64.sys ( RfeCo10X64+6465 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa90022f28130, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80780e66465, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: Dell Inc.
SYSTEM_PRODUCT_NAME: XPS 15 9575
SYSTEM_SKU: 080D
BIOS_VENDOR: Dell Inc.
BIOS_VERSION: 1.5.1
BIOS_DATE: 03/25/2019
BASEBOARD_MANUFACTURER: Dell Inc.
BASEBOARD_PRODUCT: 0C32VW
BASEBOARD_VERSION: A00
DUMP_TYPE: 0
BUGCHECK_P1: ffffa90022f28130
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80780e66465
WRITE_ADDRESS: ffffa90022f28130
CURRENT_IRQL: 2
FAULTING_IP:
RfeCo10X64+6465
fffff807`80e66465 f0480fc13b lock xadd qword ptr [rbx],rdi
CPU_COUNT: 8
CPU_MHZ: c18
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: 9
CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 8E'00000000 (cache) 8E'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 06-08-2019 20:54:30.0921
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
DPC_STACK_BASE: FFFFF90B37647FB0
TRAP_FRAME: fffff90b37646e50 -- (.trap 0xfffff90b37646e50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff90b37647018
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80780e66465 rsp=fffff90b37646fe0 rbp=ffff970b1ccf8b40
r8=0000000000048344 r9=0000000000000014 r10=ffff970b16714440
r11=ffff970b20fd8b50 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
RfeCo10X64+0x6465:
fffff807`80e66465 f0480fc13b lock xadd qword ptr [rbx],rdi ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8072b1de669 to fffff8072b1ccef0
STACK_TEXT:
fffff90b`37646d08 fffff807`2b1de669 : 00000000`0000000a ffffa900`22f28130 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff90b`37646d10 fffff807`2b1daa8e : ffff970b`1e0d9010 fffff807`38ef72ee ffffa900`2112db00 ffff970b`1e0d9010 : nt!KiBugCheckDispatch+0x69
fffff90b`37646e50 fffff807`80e66465 : ffffa900`22f28130 00000000`00000000 ffff970b`20fd8b50 fffff807`3873418c : nt!KiPageFault+0x44e
fffff90b`37646fe0 fffff807`80e65875 : ffff970b`23f8a060 ffff970b`20fd8b50 ffff970b`1ccf8b40 00000000`00000001 : RfeCo10X64+0x6465
fffff90b`37647040 fffff807`387363d1 : fffff807`2baf3d40 00000000`00000000 ffff970b`23b0edd0 fffff807`38202160 : RfeCo10X64+0x5875
fffff90b`37647090 fffff807`38372db7 : ffff970b`20fd8b50 00000000`00000000 00000000`00000001 ffff970b`19d78330 : fwpkclnt!FwppInjectComplete+0xb1
fffff90b`376470d0 fffff807`38372cdb : 00000000`00000000 00000000`00000000 00000000`00000000 ffff970b`20fd8b50 : NETIO!NetioDereferenceNetBufferList+0xb7
fffff90b`37647110 fffff807`38495e64 : 00000000`00000000 ffff970b`1caa5001 00000000`00000000 ffff970b`1eda17e0 : NETIO!NetioDereferenceNetBufferListChain+0x21b
fffff90b`37647190 fffff807`3820194d : 00000000`00000001 fffff90b`37647229 ffff970b`1e10ec00 00000000`00000001 : tcpip!FlSendNetBufferListChainComplete+0x64
fffff90b`376471c0 fffff807`382066a3 : 00000000`00000001 ffff970b`232aa701 ffff970b`00000001 fffff90b`37647350 : ndis!ndisMSendCompleteNetBufferListsInternal+0x22d
fffff90b`37647290 fffff807`38201f91 : ffff970b`1de2eed3 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallSendCompleteHandler+0x33
fffff90b`376472d0 fffff807`3b66593d : ffff970b`1a1e71a0 ffff970b`232aa780 ffff970b`1aa44a90 ffff970b`232aa700 : ndis!NdisMSendNetBufferListsComplete+0x301
fffff90b`376473e0 fffff807`3b632ef0 : ffff970b`1aa44a90 fffff807`3b4e5d01 ffff970b`232aa780 00000000`00000000 : wdiwifi!CPort::SendCompleteNetBufferLists+0xf5
fffff90b`37647430 fffff807`3b6274da : ffff970b`19c0d7d0 fffff807`3b6c2500 ffff970b`232aa780 00000000`00000000 : wdiwifi!CAdapter::SendCompleteNbl+0x11c
fffff90b`376474a0 fffff807`3b6271f1 : ffff970b`19c0d7d0 fffff807`3b6c2540 fffff90b`37647600 ffff970b`20cd7be0 : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
fffff90b`37647500 fffff807`3b624aaa : 00000000`0000ffff fffff90b`376476c0 00000000`00000000 00000000`00000000 : wdiwifi!CTxMgr::CompleteNBLs+0x59
fffff90b`37647540 fffff807`3b61746a : fffff807`3b617450 fffff807`00000000 00000000`00000000 fffff90b`376476c0 : wdiwifi!CTxMgr::TxSendCompleteInd+0x6c2
fffff90b`37647610 fffff807`3b479828 : ffff970b`21944b90 fffff807`3b4aa6d1 00000000`000003ff ffff970b`21944b90 : wdiwifi!AdapterTxSendCompleteInd+0x1a
fffff90b`37647650 fffff807`3b4b9454 : ffff970b`2191e030 ffff970b`21944b90 ffffa900`1f370608 fffff807`3821fccd : Qcamain10x64+0xf9828
fffff90b`37647790 fffff807`3b4d62ba : fffff807`3b4b9150 00000000`00000001 ffff970b`2210cca0 ffff970b`21ea5210 : Qcamain10x64+0x139454
fffff90b`37647810 fffff807`3b4d6a81 : ffff970b`2210cca0 ffff970b`23ea8c00 00000000`00000000 fffff807`3b4abdfb : Qcamain10x64+0x1562ba
fffff90b`37647850 fffff807`3b4ab9b9 : ffff970b`21944b90 ffff970b`19da0008 fffff807`3b4d64f0 fffff90b`00000000 : Qcamain10x64+0x156a81
fffff90b`37647900 fffff807`3b4ab291 : ffff970b`21944b90 fffff90b`376479a8 ffff970b`21944bb8 ffff970b`19daab20 : Qcamain10x64+0x12b9b9
fffff90b`37647950 fffff807`3b4b26ab : ffff970b`23907710 ffff970b`21944c48 ffff970b`18bd2b60 fffff90b`3e3cf600 : Qcamain10x64+0x12b291
fffff90b`376479f0 fffff807`3b49b638 : 00000000`00000010 ffff970b`00003fff 00000000`3e3cf600 fffff807`2ba8c9f5 : Qcamain10x64+0x1326ab
fffff90b`37647aa0 fffff807`3b49b513 : ffff970b`19bf1950 fffff90b`37647bf9 ffff970b`1a1e71a0 00000000`00000000 : Qcamain10x64+0x11b638
fffff90b`37647ae0 fffff807`38206838 : 00000000`00000003 00000000`00000003 ffffa900`1fb0a180 fffff807`2ba8c945 : Qcamain10x64+0x11b513
fffff90b`37647b30 fffff807`2b092677 : 00000000`00000000 ffff970b`1ab7d300 ffff970b`1ab7d300 fffff807`2b09eeb1 : ndis!ndisInterruptDpc+0x188
fffff90b`37647c60 fffff807`2b091cbe : 00000000`00000000 00000000`00989680 ffff970b`21b93080 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
fffff90b`37647da0 fffff807`2b1d3d65 : 25048b48`65ea8b48 ffffa900`1fa79180 fffff90b`3d107a80 00000000`00000000 : nt!KiRetireDpcList+0x1ae
fffff90b`37647fb0 fffff807`2b1d3b50 : 00000000`000005c4 00000000`00000000 00007ff9`7b222270 00000000`000005c4 : nt!KxRetireDpcList+0x5
fffff90b`3d1079d0 fffff807`2b1d323c : ffff970b`00000000 0000001a`00000001 00000000`00000000 fffff90b`3d107a80 : nt!KiDispatchInterruptContinue
fffff90b`3d107a00 00007ff9`18783d73 : 0000011c`c7402fb0 00007ff9`1878c693 00000000`00000010 00007ff9`1878c88a : nt!KiDpcInterrupt+0x2dc
0000001a`1a3ff600 00007ff9`18783c4b : 0000001a`1a3ff7a0 80000000`00000000 0000011c`c7402fb0 00000000`00000001 : chrome_child!ChromeMain+0x52233
0000001a`1a3ff660 00007ff9`1878370f : 0000011c`c7402450 00007ff9`1873144b 00000000`00000000 00007ff9`7dd7267d : chrome_child!ChromeMain+0x5210b
0000001a`1a3ff720 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : chrome_child!ChromeMain+0x51bcf
THREAD_SHA1_HASH_MOD_FUNC: 022f77b82a53087b3ffc60aea8329f0cad3d8cc4
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 45154741357001877003fe820cf184f0133934f4
THREAD_SHA1_HASH_MOD: 0e0d699cbfc7c0b564ddb9b18a53de88c4f10c8d
FOLLOWUP_IP:
RfeCo10X64+6465
fffff807`80e66465 f0480fc13b lock xadd qword ptr [rbx],rdi
FAULT_INSTR_CODE: c10f48f0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: RfeCo10X64+6465
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: RfeCo10X64
IMAGE_NAME: RfeCo10X64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5a4fa4c2
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 6465
FAILURE_BUCKET_ID: AV_RfeCo10X64!unknown_function
BUCKET_ID: AV_RfeCo10X64!unknown_function
PRIMARY_PROBLEM_CLASS: AV_RfeCo10X64!unknown_function
TARGET_TIME: 2019-06-07T12:02:55.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2021-07-31 17:45:35
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 77ef
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_rfeco10x64!unknown_function
FAILURE_ID_HASH: {92b9b66f-5dad-203d-ac33-c7234d721dcc}
Followup: MachineOwner
---------
2: kd> lmvm RfeCo10X64
Browse full module list
start end module name
fffff807`80e60000 fffff807`85413000 RfeCo10X64 (no symbols)
Loaded symbol image file: RfeCo10X64.sys
Image path: \SystemRoot\system32\DRIVERS\RfeCo10X64.sys
Image name: RfeCo10X64.sys
Browse all global symbols functions data
Timestamp: Fri Jan 5 08:16:02 2018 (5A4FA4C2)
CheckSum: 00022E7D
ImageSize: 045B3000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
2: kd> !blackboxpnp
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132043825667230304
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SWD\RADIO\Bluetooth_9cb6d08ed028
VetoString :
2: kd> lmvm qcamain10x64
Browse full module list
start end module name
fffff807`3b380000 fffff807`3b608000 Qcamain10x64 (no symbols)
Loaded symbol image file: Qcamain10x64.sys
Image path: \SystemRoot\System32\drivers\Qcamain10x64.sys
Image name: Qcamain10x64.sys
Browse all global symbols functions data
Timestamp: Mon Jul 23 22:30:14 2018 (5B56B966)
CheckSum: 0024B1C1
ImageSize: 00288000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
2: kd> lmvm chrome_child
Browse full module list
start end module name
00007ff9`18730000 00007ff9`1e19a000 chrome_child (export symbols) chrome_child.dll
Loaded symbol image file: chrome_child.dll
Image path: C:\Program Files (x86)\Google\Chrome\Application\74.0.3729.169\chrome_child.dll
Image name: chrome_child.dll
Browse all global symbols functions data
Timestamp: Sun May 19 22:00:00 2019 (5CE23450)
CheckSum: 0587C68E
ImageSize: 05A6A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
2: kd> !pte ffffa90022f28130
VA ffffa90022f28130
PXE at FFFFDCEE773B9A90 PPE at FFFFDCEE77352000 PDE at FFFFDCEE6A4008B8 PTE at FFFFDCD480117940
contains 0A00000004282863 contains 0A00000004283863 contains 0A0000014965A863 contains 0000000000000000
pfn 4282 ---DA--KWEV pfn 4283 ---DA--KWEV pfn 14965a ---DA--KWEV not valid
2: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
2: kd> !dpx
Start memory scan : 0xfffff90b37646d08 ($csp)
End memory scan : 0xfffff90b37647fb0 (DPC Stack Base)
rsp : 0xfffff90b37646d08 : 0xfffff8072b1de669 : nt!KiBugCheckDispatch+0x69
0xfffff90b37646d08 : 0xfffff8072b1de669 : nt!KiBugCheckDispatch+0x69
*** ERROR: Module load completed but symbols could not be loaded for RfeCo10X64.sys
*** ERROR: Symbol file could not be found. Defaulted to export symbols for chrome_child.dll -
0xfffff90b37646d50 : 0x00007ff91d440cf9 : !da "src_file"
0xfffff90b37646d58 : 0x00007ff91d2f999b : !da "src_func"
0xfffff90b37646e48 : 0xfffff8072b1daa8e : nt!KiPageFault+0x44e
0xfffff90b37646e58 : 0xfffff80738ef72ee : nwifi!Dot11QueueRecvPacket+0x11a
0xfffff90b37646f48 : 0xfffff80738362870 : NETIO!MdpFree+0x70
0xfffff90b37646f58 : 0xfffff80738201585 : ndis!NdisFreeCloneNetBufferList+0x145
0xfffff90b37646f68 : 0xfffff80738202781 : ndis!ndisMIndicateNetBufferListsToOpen+0x221
0xfffff90b37646ff8 : 0xfffff8073873418c : fwpkclnt!FwpsFreeCloneNetBufferList0+0x1fc
0xfffff90b37647068 : 0xfffff80738efd612 : nwifi!Pt6Receive+0x2e2
0xfffff90b37647078 : 0xfffff8072bab3eda : hal!HalpDmaFreeMapRegisters+0xfa
0xfffff90b37647088 : 0xfffff807387363d1 : fwpkclnt!FwppInjectComplete+0xb1
0xfffff90b37647090 : 0xfffff8072baf3d40 : hal!MasterAdapterV2
0xfffff90b376470a8 : 0xfffff80738202160 : ndis!ndisMTopReceiveNetBufferLists
0xfffff90b376470c8 : 0xfffff80738372db7 : NETIO!NetioDereferenceNetBufferList+0xb7
0xfffff90b37647108 : 0xfffff80738372cdb : NETIO!NetioDereferenceNetBufferListChain+0x21b
0xfffff90b37647178 : 0xffff970b1e0f38a0 : 0xfffff8073864a390 : tcpip!gWfpGlobalTriageBlock
0xfffff90b37647188 : 0xfffff80738495e64 : tcpip!FlSendNetBufferListChainComplete+0x64
0xfffff90b376471b8 : 0xfffff8073820194d : ndis!ndisMSendCompleteNetBufferListsInternal+0x22d
0xfffff90b376471e8 : 0xfffff807394d10be : pacer!PcFilterSendNetBufferListsComplete+0x2e
0xfffff90b37647240 : 0xffff970b1e0d2010 : 0xfffff807394c0140 : vwififlt!FilterModuleList
0xfffff90b37647278 : 0xfffff80738201720 : ndis!ndisMSendCompleteNetBufferListsInternal
0xfffff90b37647288 : 0xfffff807382066a3 : ndis!ndisCallSendCompleteHandler+0x33
0xfffff90b376472c8 : 0xfffff80738201f91 : ndis!NdisMSendNetBufferListsComplete+0x301
0xfffff90b37647320 : 0xfffff80738201720 : ndis!ndisMSendCompleteNetBufferListsInternal
0xfffff90b37647378 : 0xfffff8073b6657ef : wdiwifi!CPort::FreeTxWfcFrame+0x20b
0xfffff90b376473a8 : 0xfffff8073b6c3c58 : wdiwifi!WPP_196647d4e2813e9e18ee82314aa41a19_Traceguids
0xfffff90b376473c0 : 0xffff970b19c0a000 : dt wdiwifi!CAdapter
0xfffff90b376473d8 : 0xfffff8073b66593d : wdiwifi!CPort::SendCompleteNetBufferLists+0xf5
0xfffff90b376473f0 : 0xffff970b1aa44a90 : dt wdiwifi!CPort
*** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
0xfffff90b37647428 : 0xfffff8073b632ef0 : wdiwifi!CAdapter::SendCompleteNbl+0x11c
0xfffff90b37647430 : 0xffff970b1aa44a90 : dt wdiwifi!CPort
0xfffff90b37647438 : 0xfffff8073b4e5d01 : !da ""oint with status %d.""
0xfffff90b37647458 : 0xfffff8073b6236f9 : wdiwifi!CTxMgr::TxTargetDescDeinit+0xad
0xfffff90b37647468 : 0xffff970b19c0d7d0 : dt wdiwifi!CTxMgr
0xfffff90b37647480 : 0xfffff8073b6c2540 : wdiwifi!WPP_571c4b53a7e93995593833a71eb533d1_Traceguids
0xfffff90b37647498 : 0xfffff8073b6274da : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
0xfffff90b376474a0 : 0xffff970b19c0d7d0 : dt wdiwifi!CTxMgr
0xfffff90b376474a8 : 0xfffff8073b6c2500 : !da "itialization."
0xfffff90b376474c8 : 0xfffff8073b61af7b : wdiwifi!CRxMgr::RxInOrderDataInd+0x177
0xfffff90b376474d0 : 0xfffff8073b6c2510 : wdiwifi!WPP_983731aa4cbd38c939d2cb57b6e4f6ef_Traceguids
0xfffff90b376474e0 : 0xffff970b19c0d7d0 : dt wdiwifi!CTxMgr
0xfffff90b376474f8 : 0xfffff8073b6271f1 : wdiwifi!CTxMgr::CompleteNBLs+0x59
0xfffff90b37647500 : 0xffff970b19c0d7d0 : dt wdiwifi!CTxMgr
0xfffff90b37647508 : 0xfffff8073b6c2540 : wdiwifi!WPP_571c4b53a7e93995593833a71eb533d1_Traceguids
0xfffff90b37647538 : 0xfffff8073b624aaa : wdiwifi!CTxMgr::TxSendCompleteInd+0x6c2
0xfffff90b37647568 : 0xfffff8073b617653 : wdiwifi!AdapterRxInorderDataInd+0x83
0xfffff90b37647608 : 0xfffff8073b61746a : wdiwifi!AdapterTxSendCompleteInd+0x1a
0xfffff90b37647610 : 0xfffff8073b617450 : wdiwifi!AdapterTxSendCompleteInd
0xfffff90b376476f8 : 0xfffff8072b06b5c4 : nt!MmBuildMdlForNonPagedPool+0x2a4
0xfffff90b37647708 : 0xfffff80738205be3 : ndis!NdisFreeNetBufferList+0xc3
0xfffff90b37647718 : 0xfffff8072b02fe5a : nt!ExInterlockedInsertTailList+0x4a
0xfffff90b376477a8 : 0xfffff8073821fccd : ndis!NdisAllocateMdl+0x3d
0xfffff90b37647998 : 0xfffff8072b0fcbf0 : nt!PpmCheckSnapAllDeliveredPerformance+0x400
0xfffff90b376479b8 : 0xfffff8073b552ce8 : !da "CE_per_engine_service"
0xfffff90b37647ab8 : 0xfffff8072ba8c9f5 : hal!HalpApicRequestInterrupt+0x95
0xfffff90b37647b08 : 0xfffff8072b0301ce : nt!KeQueryInterruptTimePrecise+0x5e
0xfffff90b37647b18 : 0xfffff8072b2afd6f : nt!KiHeteroChooseTargetProcessor+0x83
0xfffff90b37647b28 : 0xfffff80738206838 : ndis!ndisInterruptDpc+0x188
0xfffff90b37647b48 : 0xfffff8072ba8c945 : hal!HalSendSoftwareInterrupt+0xa5
0xfffff90b37647c28 : 0xfffff90b37647e70 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647c58 : 0xfffff8072b092677 : nt!KiExecuteAllDpcs+0x2e7
0xfffff90b37647c78 : 0xfffff8072b09eeb1 : nt!KiReadyThread+0x71
0xfffff90b37647cb0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647cc8 : 0xfffff8072b1069a3 : nt!KiTimer2Expiration+0x323
0xfffff90b37647d38 : 0xfffff90b37647cb0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647d98 : 0xfffff8072b091cbe : nt!KiRetireDpcList+0x1ae
0xfffff90b37647e70 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647e80 : 0xfffff8072b14fbf0 : nt!PpmCheckRun
0xfffff90b37647e90 : 0xfffff80737f2f5b0 : storport!RaidpAdapterRedirectDpcRoutine
0xfffff90b37647ea0 : 0xfffff80737f2f5b0 : storport!RaidpAdapterRedirectDpcRoutine
0xfffff90b37647eb0 : 0xfffff80737e7d3ac : "iaStorAVC!`anonymous namespace'::dpcRoutine"
0xfffff90b37647ec0 : 0xfffff80737f2f5b0 : storport!RaidpAdapterRedirectDpcRoutine
0xfffff90b37647ed0 : 0xfffff8072b1041f0 : nt!PpmCheckPeriodicStart
0xfffff90b37647ee0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647ef0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647f00 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647f10 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
0xfffff90b37647fa8 : 0xfffff8072b1d3d65 : nt!KxRetireDpcList+0x5
I do not know how you did it, but for some reason there was a dump from ... your Google Chrome browser
So update:
Wi-Fi drivers and killer networking suite (Page not found – Killer Networking | Killernetworking | Killer Control Center or check in SDI Download)
Google Chrome (check updates in program)