I assume the 2x8GB sticks are not the same as the 2x4GB sticks so I would recommend to remove either of them.
I also assume you've used the kernel dump for analysis? My stack trace is slightly different than yours.
I would suggest to check Dell for driver updates.
My analysis:
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000000b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800937c0d83, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10586.545.amd64fre.th2_release.160802-1857
SYSTEM_MANUFACTURER: Dell Inc.
SYSTEM_PRODUCT_NAME: XPS 8500
SYSTEM_SKU: To be filled by O.E.M.
BIOS_VENDOR: Dell Inc.
BIOS_VERSION: A12
BIOS_DATE: 08/28/2013
BASEBOARD_MANUFACTURER: Dell Inc.
BASEBOARD_PRODUCT: 0NW73C
BASEBOARD_VERSION: A00
DUMP_TYPE: 2
BUGCHECK_P1: b0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800937c0d83
READ_ADDRESS: fffff802f458a520: Unable to get MiVisibleState
00000000000000b0
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!StreamProcessCallout+793
fffff800`937c0d83 4883b8b000000000 cmp qword ptr [rax+0B0h],0
CPU_COUNT: 8
CPU_MHZ: d40
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-FO9QHGA
ANALYSIS_SESSION_TIME: 08-11-2016 18:23:55.0657
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
TRAP_FRAME: ffffd0017ae6e580 -- (.trap 0xffffd0017ae6e580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff800938138e0
rdx=0000000000001001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800937c0d83 rsp=ffffd0017ae6e710 rbp=ffffd0017ae6e801
r8=ffffe00094887f30 r9=0000000000000000 r10=fffff800938138e0
r11=ffffe0009499c3e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!StreamProcessCallout+0x793:
fffff800`937c0d83 4883b8b000000000 cmp qword ptr [rax+0B0h],0 ds:00000000`000000b0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802f435a4e9 to fffff802f434f940
STACK_TEXT:
ffffd001`7ae6e438 fffff802`f435a4e9 : 00000000`0000000a 00000000`000000b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd001`7ae6e440 fffff802`f4358cc7 : ffffd001`7ae6e880 fffff802`f4343441 ffffd001`7ae6e80f fffff802`f4343441 : nt!KiBugCheckDispatch+0x69
ffffd001`7ae6e580 fffff800`937c0d83 : ffffe000`3ce85010 ffffe000`9499c3e0 ffffd001`7ae6eb30 ffffd001`7ae6eb30 : nt!KiPageFault+0x247
ffffd001`7ae6e710 fffff800`937bf1ca : ffffe000`3d650014 fffff800`9801f0d4 ffffd001`00000001 ffffd001`7ae6f1f8 : NETIO!StreamProcessCallout+0x793
ffffd001`7ae6e850 fffff800`937be060 : ffffe000`3c8d0014 ffffd001`7ae6f1f8 ffffd001`7ae6f230 ffffd001`7ae6f0b0 : NETIO!ProcessCallout+0x6ba
ffffd001`7ae6e9c0 fffff800`937bcc0f : be99740f`856d66c6 ffffd001`7ae6ecb0 00000000`00000000 ffffe000`4440f3b0 : NETIO!ArbitrateAndEnforce+0x4a0
ffffd001`7ae6ebb0 fffff800`937ba3c0 : 00000000`00000000 ffffd001`7ae6f648 ffffd001`7ae6f180 fffff800`937d792b : NETIO!KfdClassify+0x32f
ffffd001`7ae6f000 fffff800`937ba021 : 00000000`00000000 ffffe000`4440f030 ffffd001`7ae6f648 fffff800`938df569 : NETIO!StreamClassify+0x268
ffffd001`7ae6f1a0 fffff800`937b93ec : 00000000`00000000 00000000`00000000 ffffe000`945e44d0 fffff800`937c61dd : NETIO!StreamCommonInspect+0x24d
ffffd001`7ae6f540 fffff800`938a1b46 : ffffe000`43898300 ffffe000`945e4400 ffffe000`95ff8010 00000000`00000000 : NETIO!WfpStreamInspectReceive+0x15c
ffffd001`7ae6f5d0 fffff800`938a03ff : 00000000`00000001 ffffe000`43898030 00000000`00000000 ffffd001`7c08c3da : tcpip!TcpTcbFastDatagram+0x1056
ffffd001`7ae6f800 fffff800`9389f7cb : ffffd001`00000000 ffff9ba8`00000000 ffffd001`00000001 ffffe000`3f98f430 : tcpip!TcpTcbReceive+0x39f
ffffd001`7ae6fa50 fffff800`9389f215 : 00000000`00000000 00000000`00328c96 ffffd001`7c08c3e2 0000002c`6954e8ff : tcpip!TcpMatchReceive+0x1fb
ffffd001`7ae6fd00 fffff800`9389dfb3 : ffffe000`3f98f430 ffffd001`7ae6f3fd ffffd001`7ae65000 ffffe000`7ffffff1 : tcpip!TcpPreValidatedReceive+0x385
ffffd001`7ae6fdf0 fffff800`9389db20 : ffffd001`000000a8 ffffd001`00000012 ffffe719`70664b3f ffffe000`00000001 : tcpip!IppDeliverListToProtocol+0x73
ffffd001`7ae6feb0 fffff800`9389d1d8 : 00000000`00000001 ffffd001`7ae6ff98 00000000`00000000 ffffd001`7ae6ffb9 : tcpip!IppProcessDeliverList+0x60
ffffd001`7ae6ff20 fffff800`9389e5b8 : fffff800`93a0c000 ffffe000`3d7e0130 00000000`00000003 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388
ffffd001`7ae70020 fffff800`938def9f : ffffe000`44da2870 ffffe000`43898380 ffffd001`7ae70201 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
ffffd001`7ae70140 fffff800`938de5fe : 00000000`00010002 ffffd001`00000003 fffff800`938cc760 ffffd001`43898301 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffd001`7ae70220 fffff802`f4273115 : 00000000`00000002 ffffe000`3f806040 fffff800`938de530 ffffd001`7ae703d0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
ffffd001`7ae70350 fffff800`938cc8e6 : ffffe000`3f8eb950 00000000`00000000 ffffe000`3f8eb8f0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd001`7ae703a0 fffff800`93692d97 : ffffe000`43938b20 ffffd001`7ae70490 ffffe000`00000003 00000000`00000003 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd001`7ae70420 fffff800`93692558 : ffffe000`43938b20 ffffe000`43898380 ffffe000`00000000 00000000`00000003 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
ffffd001`7ae704d0 fffff800`9369eef5 : ffffe000`435ed1a0 ffffe000`00000001 ffffe000`435ed1a0 00000000`00000003 : ndis!ndisMTopReceiveNetBufferLists+0x318
ffffd001`7ae705d0 fffff800`93693d73 : 00000000`0012a0a4 ffffd001`7ae70720 00000000`00000000 ffffe000`4440f030 : ndis!ndisCallReceiveHandler+0x85
ffffd001`7ae70620 fffff800`96c03d3a : ffffe000`4382e000 00000000`00000000 ffffe000`00000000 ffffe000`43898260 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
ffffd001`7ae707a0 ffffe000`4382e000 : 00000000`00000000 ffffe000`00000000 ffffe000`43898260 00000000`00000001 : rt640x64+0x13d3a
ffffd001`7ae707a8 00000000`00000000 : ffffe000`00000000 ffffe000`43898260 00000000`00000001 ffffe000`ffffffff : 0xffffe000`4382e000
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: dbdaaf4878318e0b0ce56877f32ddee67a9562d9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: daec8dc92c7b16c295f46ab8168c832b19d56bfc
THREAD_SHA1_HASH_MOD: 42fd817fb6d92fefe97e6cc8bd8dff432f1019b7
FOLLOWUP_IP:
NETIO!StreamProcessCallout+793
fffff800`937c0d83 4883b8b000000000 cmp qword ptr [rax+0B0h],0
FAULT_INSTR_CODE: b0b88348
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!StreamProcessCallout+793
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5632d715
IMAGE_VERSION: 10.0.10586.0
BUCKET_ID_FUNC_OFFSET: 793
FAILURE_BUCKET_ID: AV_NETIO!StreamProcessCallout
BUCKET_ID: AV_NETIO!StreamProcessCallout
PRIMARY_PROBLEM_CLASS: AV_NETIO!StreamProcessCallout
TARGET_TIME: 2016-08-11T12:38:38.000Z
OSBUILD: 10586
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-08-03 11:15:01
BUILDDATESTAMP_STR: 160802-1857
BUILDLAB_STR: th2_release
BUILDOSVER_STR: 10.0.10586.545.amd64fre.th2_release.160802-1857
ANALYSIS_SESSION_ELAPSED_TIME: 8eee
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netio!streamprocesscallout
FAILURE_ID_HASH: {fb6ed777-1b72-9796-cc6e-f136919e0f6f}
Followup: MachineOwner
---------
[SMBIOS Data Tables v2.7]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 2342 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0001h]
Vendor Dell Inc.
BIOS Version A12
BIOS Starting Address Segment f000
BIOS Release Date 08/28/2013
BIOS ROM Size 400000
BIOS Characteristics
07: - PCI Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
48: - System Vendor Reserved
49: - System Vendor Reserved
52: - System Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
11: - Specification Reserved
BIOS Major Revision 4
BIOS Minor Revision 6
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0002h]
Manufacturer Dell Inc.
Product Name XPS 8500
Version
Serial Number C832J5J
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber To be filled by O.E.M.
Family To be filled by O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0003h]
Manufacturer Dell Inc.
Product 0NW73C
Version A00
Serial Number ..CN722002AV00HK.
Asset Tag
Feature Flags 09h
-1471331696: - (null)
-1471331648: - (null)
Location To be filled by O.E.M.
Chassis Handle 0004h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 22 - Handle 0004h]
Manufacturer Dell Inc.
Chassis Type Desktop
Version
Serial Number
Asset Tag Number [String Not Specified]
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 0
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[OEM Strings (Type 11) - Length 5 - Handle 001ch]
Number of Strings 15
1 Dell System
2 5[0000]
3 3[3.4]
4 4[0001]
5 13[D03M]
6 6[D0, D4, D8, DA, DE]
7 7[]
8 8[]
9 9[]
10 1[0545]
11 10[A12]
12 12[]
13 14[0]
14 14[0]
15
[Cache Information (Type 7) - Length 19 - Handle 0026h]
Socket Designation L1-Cache
Cache Configuration 0080h - WT Enabled Int NonSocketed L1
Maximum Cache Size 0100h - 256K
Installed Size 0100h - 256K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type None
System Cache Type Unified
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0028h]
Socket Designation L2-Cache
Cache Configuration 0081h - WT Enabled Int NonSocketed L2
Maximum Cache Size 0400h - 1024K
Installed Size 0400h - 1024K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type None
System Cache Type Unified
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0029h]
Socket Designation L3-Cache
Cache Configuration 0102h - WB Disabled Int NonSocketed L3
Maximum Cache Size 2000h - 8192K
Installed Size 2000h - 8192K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type None
System Cache Type Unified
Associativity 16-way Set-Associative
[Physical Memory Array (Type 16) - Length 23 - Handle 002ah]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 33554432KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Processor Information (Type 4) - Length 42 - Handle 002bh]
Socket Designation CPU 1
Processor Type Central Processor
Processor Family 06h - Intel486 Processor
Processor Manufacturer Intel
Processor ID a9060300fffbebbf
Processor Version Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz
Processor Voltage 8fh - 1.5V
External Clock 100MHz
Max Speed 3400MHz
Current Speed 3400MHz
Status Enabled Populated
Processor Upgrade Specification Reserved
L1 Cache Handle 0026h
L2 Cache Handle 0028h
L3 Cache Handle 0029h
Serial Number [String Not Specified]
Asset Tag Number
Part Number Fill By OEM
[Memory Device (Type 17) - Length 34 - Handle 002ch]
Physical Memory Array Handle 002ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM3
Bank Locator [String Not Specified]
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1600MHz
Manufacturer 0000
Serial Number
Asset Tag Number
Part Number
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 002dh]
Starting Address 00000000h
Ending Address 007fffffh
Memory Device Handle 002ch
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position 01
Interleave Data Depth 02
[Memory Device (Type 17) - Length 34 - Handle 002eh]
Physical Memory Array Handle 002ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 4096MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM1
Bank Locator [String Not Specified]
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1600MHz
Manufacturer Hynix/Hyundai
Serial Number
Asset Tag Number
Part Number HMT351U6CFR8C-PB
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 002fh]
Starting Address 01000000h
Ending Address 013fffffh
Memory Device Handle 002eh
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position 01
Interleave Data Depth 02
[Memory Device (Type 17) - Length 34 - Handle 0030h]
Physical Memory Array Handle 002ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM4
Bank Locator [String Not Specified]
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1600MHz
Manufacturer 0000
Serial Number
Asset Tag Number
Part Number
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 0031h]
Starting Address 00800000h
Ending Address 00ffffffh
Memory Device Handle 0030h
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position 02
Interleave Data Depth 02
[Memory Device (Type 17) - Length 34 - Handle 0032h]
Physical Memory Array Handle 002ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 4096MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM2
Bank Locator [String Not Specified]
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1600MHz
Manufacturer Hynix/Hyundai
Serial Number
Asset Tag Number
Part Number HMT351U6CFR8C-PB
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 0033h]
Starting Address 01400000h
Ending Address 017fffffh
Memory Device Handle 0032h
Mem Array Mapped Adr Handle 0034h
Partition Row Position 01
Interleave Position 02
Interleave Data Depth 02
[Memory Array Mapped Address (Type 19) - Length 31 - Handle 0034h]
Starting Address 00000000h
Ending Address 017fffffh
Memory Array Handle 002ah
Partition Width 04
Machine ID Information [From Smbios 2.7, DMIVersion 0, Size=2342]
BiosMajorRelease = 4
BiosMinorRelease = 6
BiosVendor = Dell Inc.
BiosVersion = A12
BiosReleaseDate = 08/28/2013
SystemManufacturer = Dell Inc.
SystemProductName = XPS 8500
SystemFamily = To be filled by O.E.M.
SystemVersion =
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Dell Inc.
BaseBoardProduct = 0NW73C
BaseBoardVersion = A00
CPUID: "Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz"
MaxSpeed: 3400
CurrentSpeed: 3392
GetPointerFromAddress: unable to read from fffff802f458b200
THREAD ffffe0003f806040 Cid 0004.0130 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0
Not impersonating
GetUlongFromAddress: unable to read from fffff802f44dafa8
Owning Process ffffe0003c88e040 Image: System
Attached Process N/A Image: N/A
fffff78000000000: Unable to get shared data
Wait Start TickCount 1220772
Context Switch Count 1150951 IdealProcessor: 0
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address ndis!ndisReceiveWorkerThread (0xfffff800936b0e40)
Stack Init ffffd0017ae70c90 Current ffffd0017ae707c0
Base ffffd0017ae71000 Limit ffffd0017ae6b000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
ffffd001`7ae6e438 fffff802`f435a4e9 : 00000000`0000000a 00000000`000000b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd001`7ae6e440 fffff802`f4358cc7 : ffffd001`7ae6e880 fffff802`f4343441 ffffd001`7ae6e80f fffff802`f4343441 : nt!KiBugCheckDispatch+0x69
ffffd001`7ae6e580 fffff800`937c0d83 : ffffe000`3ce85010 ffffe000`9499c3e0 ffffd001`7ae6eb30 ffffd001`7ae6eb30 : nt!KiPageFault+0x247 (TrapFrame @ ffffd001`7ae6e580)
ffffd001`7ae6e710 fffff800`937bf1ca : ffffe000`3d650014 fffff800`9801f0d4 ffffd001`00000001 ffffd001`7ae6f1f8 : NETIO!StreamProcessCallout+0x793
ffffd001`7ae6e850 fffff800`937be060 : ffffe000`3c8d0014 ffffd001`7ae6f1f8 ffffd001`7ae6f230 ffffd001`7ae6f0b0 : NETIO!ProcessCallout+0x6ba
ffffd001`7ae6e9c0 fffff800`937bcc0f : be99740f`856d66c6 ffffd001`7ae6ecb0 00000000`00000000 ffffe000`4440f3b0 : NETIO!ArbitrateAndEnforce+0x4a0
ffffd001`7ae6ebb0 fffff800`937ba3c0 : 00000000`00000000 ffffd001`7ae6f648 ffffd001`7ae6f180 fffff800`937d792b : NETIO!KfdClassify+0x32f
ffffd001`7ae6f000 fffff800`937ba021 : 00000000`00000000 ffffe000`4440f030 ffffd001`7ae6f648 fffff800`938df569 : NETIO!StreamClassify+0x268
ffffd001`7ae6f1a0 fffff800`937b93ec : 00000000`00000000 00000000`00000000 ffffe000`945e44d0 fffff800`937c61dd : NETIO!StreamCommonInspect+0x24d
ffffd001`7ae6f540 fffff800`938a1b46 : ffffe000`43898300 ffffe000`945e4400 ffffe000`95ff8010 00000000`00000000 : NETIO!WfpStreamInspectReceive+0x15c
ffffd001`7ae6f5d0 fffff800`938a03ff : 00000000`00000001 ffffe000`43898030 00000000`00000000 ffffd001`7c08c3da : tcpip!TcpTcbFastDatagram+0x1056
ffffd001`7ae6f800 fffff800`9389f7cb : ffffd001`00000000 ffff9ba8`00000000 ffffd001`00000001 ffffe000`3f98f430 : tcpip!TcpTcbReceive+0x39f
ffffd001`7ae6fa50 fffff800`9389f215 : 00000000`00000000 00000000`00328c96 ffffd001`7c08c3e2 0000002c`6954e8ff : tcpip!TcpMatchReceive+0x1fb
ffffd001`7ae6fd00 fffff800`9389dfb3 : ffffe000`3f98f430 ffffd001`7ae6f3fd ffffd001`7ae65000 ffffe000`7ffffff1 : tcpip!TcpPreValidatedReceive+0x385
ffffd001`7ae6fdf0 fffff800`9389db20 : ffffd001`000000a8 ffffd001`00000012 ffffe719`70664b3f ffffe000`00000001 : tcpip!IppDeliverListToProtocol+0x73
ffffd001`7ae6feb0 fffff800`9389d1d8 : 00000000`00000001 ffffd001`7ae6ff98 00000000`00000000 ffffd001`7ae6ffb9 : tcpip!IppProcessDeliverList+0x60
ffffd001`7ae6ff20 fffff800`9389e5b8 : fffff800`93a0c000 ffffe000`3d7e0130 00000000`00000003 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388
ffffd001`7ae70020 fffff800`938def9f : ffffe000`44da2870 ffffe000`43898380 ffffd001`7ae70201 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
ffffd001`7ae70140 fffff800`938de5fe : 00000000`00010002 ffffd001`00000003 fffff800`938cc760 ffffd001`43898301 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffd001`7ae70220 fffff802`f4273115 : 00000000`00000002 ffffe000`3f806040 fffff800`938de530 ffffd001`7ae703d0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
ffffd001`7ae70350 fffff800`938cc8e6 : ffffe000`3f8eb950 00000000`00000000 ffffe000`3f8eb8f0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd001`7ae703a0 fffff800`93692d97 : ffffe000`43938b20 ffffd001`7ae70490 ffffe000`00000003 00000000`00000003 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd001`7ae70420 fffff800`93692558 : ffffe000`43938b20 ffffe000`43898380 ffffe000`00000000 00000000`00000003 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
ffffd001`7ae704d0 fffff800`9369eef5 : ffffe000`435ed1a0 ffffe000`00000001 ffffe000`435ed1a0 00000000`00000003 : ndis!ndisMTopReceiveNetBufferLists+0x318
ffffd001`7ae705d0 fffff800`93693d73 : 00000000`0012a0a4 ffffd001`7ae70720 00000000`00000000 ffffe000`4440f030 : ndis!ndisCallReceiveHandler+0x85
ffffd001`7ae70620 fffff800`96c03d3a : ffffe000`4382e000 00000000`00000000 ffffe000`00000000 ffffe000`43898260 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3
ffffd001`7ae707a0 ffffe000`4382e000 : 00000000`00000000 ffffe000`00000000 ffffe000`43898260 00000000`00000001 : rt640x64+0x13d3a
ffffd001`7ae707a8 00000000`00000000 : ffffe000`00000000 ffffe000`43898260 00000000`00000001 ffffe000`ffffffff : 0xffffe000`4382e000
Bugcheck code 000000D1
Arguments 00000000`000000b0 00000000`00000002 00000000`00000000 fffff800`937c0d83
Debug session time: Thu Aug 11 14:38:38.832 2016 (UTC + 2:00)
System Uptime: 0 days 5:17:54.573
0: kd> lmvm rt640x64
Browse full module list
start end module name
fffff800`96bf0000 fffff800`96c84000 rt640x64 T (no symbols)
Loaded symbol image file: rt640x64.sys
Image path: \SystemRoot\System32\drivers\rt640x64.sys
Image name: rt640x64.sys
Browse all global symbols functions data
Timestamp: Wed Oct 07 17:03:55 2015 (5615345B)
CheckSum: 0009543E
ImageSize: 00094000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4